SK0-005 Exam Prep Free – 50 Practice Questions to Get You Ready for Exam Day
Getting ready for the SK0-005 certification? Our SK0-005 Exam Prep Free resource includes 50 exam-style questions designed to help you practice effectively and feel confident on test day
Effective SK0-005 exam prep free is the key to success. With our free practice questions, you can:
- Get familiar with exam format and question style
- Identify which topics you’ve mastered—and which need more review
- Boost your confidence and reduce exam anxiety
Below, you will find 50 realistic SK0-005 Exam Prep Free questions that cover key exam topics. These questions are designed to reflect the structure and challenge level of the actual exam, making them perfect for your study routine.
A server administrator needs to replace a 4U rack-mounted device. Which of the following is the BEST way to install the device to ensure proper safety measures?
A. Lift with the arms while bending the knees.
B. Use a server lift.
C. Use a rolling cart.
D. Lift the device with the help of another administrator.
A technician installed a kernel upgrade to a Linux server. The server now crashes regularly. Which of the following is the MOST likely cause?
A. Necessary dependencies were installed for multiple architectures.
B. There is not enough hard drive space.
C. The server is infected with a virus.
D. Some modules are not compatible.
A server administrator added a new drive to a server. However, the drive is not showing up as available. Which of the following does the administrator need to do to make the drive available?
A. Partition the drive.
B. Create a new disk quota.
C. Configure the drive as dynamic.
D. Set the compression.
A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy. Which of the following should the company also perform as a data loss prevention method?
A. Encrypt all network traffic
B. Implement MFA on all the servers with encrypted data
C. Block the servers from using an encrypted USB
D. Implement port security on the switches
An administrator notices high traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?
A. Anti-malware
B. Nbtstat
C. Port scanner
D. Sniffer
The management team has mandated the use of data-at-rest encryption for all data. Which of the following forms of encryption best achieves this goal?
A. Drive
B. Database
C. Folder
D. File
A server administrator is using remote access to update a server. The administrator notices numerous error messages when using YUM to update the applications on a server. Which of the following should the administrator check FIRST?
A. Network connectivity on the server
B. LVM status on the server
C. Disk space in the /var directory
D. YUM dependencies
Which of the following should be configured in pairs on a server to provide network redundancy?
A. MRU
B. SCP
C. DLP
D. CPU
E. NIC
A new application server has been configured in the cloud to provide access to all clients within the network. On-site users are able to access all resources, but remote users are reporting issues connecting to the new application. The server administrator verifies that all users are configured with the appropriate group memberships. Which of the following is most likely causing the issue?
A. Telnet connections are disabled on the server.
B. Role-based access control is misconfigured.
C. There are misconfigured firewall rules.
D. Group policies have not been applied.
A technician needs maximum power redundancy while configuring a new server rack. Which of the following should be specified? (Choose two.)
A. Separate circuits
B. Rack balancing
C. Blanking panels
D. High-voltage PDUs
E. KVM placement
F. Multiple UPSs
A technician is tasked with upgrading 24 hosts simultaneously with a Type 1 hypervisor. Which of the following protocols should the technician use for this upgrade?
A. VPN
B. TFTP
C. SSH
D. HTTP
Which of the following asset management documents is used to identify the location of a server within a data center?
A. Infrastructure diagram
B. Workflow diagram
C. Rack layout
D. Service manual
An application server cannot communicate with a newly installed database server. The database server, which has static IP information, is reading the following output from ipconfig: IP: 10.0.10.240 - Mask: 255.255.255.128 - Gateway: 10.0.10.1 - The application server is reading the following output from ipconfig: IP: 10.0.10.25 - Mask: 255.255.255.128 - Gateway: 10.0.10.1 - Which of the following MOST likely contains an error?
A. IP address
B. DHCP
C. Gateway
D. Subnet mask
An administrator has been asked to increase the storage capacity of a stand-alone file server, but no further expansion slots are available. Which of the following would be the FASTEST solution to implement with no downtime?
A. Configure a RAID array.
B. Replace the current drives with higher-capacity disks.
C. Implement FCoE for more storage capacity.
D. Connect the server to a SAN.
A systems administrator is performing maintenance on 12 Windows servers that are in different racks at a large datacenter. Which of the following would allow the administrator to perform maintenance on all 12 servers without having to physically be at each server? (Choose two.)
A. Remote desktop
B. IP KVM
C. A console connection
D. A virtual administration console
E. Remote drive access
F. A crash cart
Ann, an administrator, has been troubleshooting a server issue. She carefully questioned the users and examined the available logs. Using this information, she was able to rule out several possible causes and develop a theory as to what the issue might be. Through further testing, her theory proved to be correct. Which of the following should be the NEXT step to troubleshoot the issue?
A. Document the findings and actions.
B. Escalate the issue to the management team.
C. Implement the solution.
D. Establish an action plan
A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company's BEST course of action?
A. Upgrade the application package
B. Tighten the rules on the firewall
C. Install antivirus software
D. Patch the server OS
Which of the following backup types copies changed data from a server and then combines the backups on the backup target?
A. Differential
B. Incremental
C. Synthetic full
D. Snapshot
An organization is donating its outdated server equipment to a local charity. Which of the following describes what the organization should do before donating the equipment?
A. Remove all the data from the server drives using the least destructive method.
B. Repurpose and recycle any usable server components.
C. Remove all the components from the server.
D. Review all company policies.
A technician is connecting a Linux server to a share on a NAS. Which of the following is the MOST appropriate native protocol to use for this task?
A. CIFS
B. FTP
C. SFTP
D. NFS
A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?
A. 11.251.196.241
B. 171.245.198.241
C. 172.16.19.241
D. 193.168.145.241
An administrator discovers a misconfiguration that impacts all servers but can be easily corrected. The administrator has a list of affected servers and a script to correct the issue. Which of the following scripting principles should the administrator use to cycle through the list of servers to deliver the needed change?
A. Linked list
B. String
C. Loop
D. Constant
A systems administrator has noticed performance degradation on a company file server, and one of the disks on it has a solid amber light. The administrator logs on to the disk utility and sees the array is rebuilding. Which of the following should the administrator do NEXT once the rebuild is finished?
A. Restore the server from a snapshot.
B. Restore the server from backup.
C. Swap the drive and initialize the disk.
D. Swap the drive and initialize the array.
A server administrator recently installed a kernel update to test functionality. Upon reboot, the administrator determined the new kernel was not compatible with certain server hardware and was unable to uninstall the update. Which of the following should the administrator do to mitigate further issues with the newly installed kernel version?
A. Edit the bootloader configuration file and change the first kernel stanza to reflect the file location for the last known-good kernel files.
B. Perform a complete OS reinstall on the server using the same media that was used during the initial install.
C. Edit the bootloader configuration file and move the newest kernel update stanza to the end of the file.
D. Set a BIOS password to prevent server technicians from making any changes to the system.
A developer is creating a web application that will contain five web nodes. The developer's main goal is to ensure the application is always available to the end users. Which of the following should the developer use when designing the web application?
A. Round robin
B. Link aggregation
C. Network address translation
D. Bridged networking
A server administrator is deploying a new server that has two hard drives on which to install the OS. Which of the following RAID configurations should be used to provide redundancy for the OS?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 6
A technician noted the RAID hard drives were functional while troubleshooting a motherboard failure. The technician installed a spare motherboard with similar specifications and used the original components. Which of the following should the technician do to restore operations with minimal downtime?
A. Reinstall the OS and programs.
B. Configure old drives to RAID.
C. Reconfigure the RAID.
D. Install from backup.
A server administrator is installing servers in a rack that does not have rack unit markings on the sides. The available open space for the new servers is approximately 3.5in (8.9cm) high. Which of the following is the LARGEST server size that can fit in this space?
A. 1U
B. 2U
C. 3U
D. 4U
An administrator is only able to log on to a server with a local account. The server has been successfully joined to the domain and can ping other servers by IP address. Which of the following locally defined settings is MOST likely misconfigured?
A. DHCP
B. WINS
C. DNS
D. TCP
A new virtual server was deployed in a perimeter network. Users have reported the time on the server has been incorrect. The engineer has verified the configuration, and the internal time servers are configured properly. Which of the following should the engineer do to resolve this issue?
A. Check the firewall rules.
B. Replace the CMOS battery in the server.
C. Restart the time servers.
D. Manually correct the time.
Which of the following policies would be BEST to deter a brute-force login attack?
A. Password complexity
B. Password reuse
C. Account age threshold
D. Account lockout threshold
A server administrator is setting up a new payroll application. Compliance regulations require that all financial systems logs be stored in a central location. Which of the following should the administrator configure to ensure this requirement is met?
A. Alerting
B. Retention
C. Shipping
D. Rotation
A server administrator is deploying a UPS at a datacenter and notices the device is making an audible beep every few seconds. Which of the following is the MOST likely cause?
A. The battery cable is disconnected
B. The device is plugged into the wrong outlet
C. The battery is faulty
D. The serial cable is not connected
A server administrator needs to harden a server by only allowing secure traffic and DNS inquiries. A port scan reports the following ports are open: 443 636 Which of the following open ports should be closed to secure the server properly? (Choose two.)
A. 21
B. 22
C. 23
D. 53
E. 443
F. 636
Which of the following should be placed at the top of a Bash script to ensure it can be executed?
A. bash
B. !execute
C. #!
D. @echo off
Which of the following encryption methodologies would MOST likely be used to ensure encrypted data cannot be retrieved if a device is stolen?
A. End-to-end encryption
B. Encryption in transit
C. Encryption at rest
D. Public key encryption
A company stores extremely sensitive data on an air-gapped system. Which of the following can be implemented to increase security against a potential insider threat?
A. Two-person integrity
B. SSO
C. SIEM
D. Faraday cage
E. MFA
A server administrator is connecting a new storage array to a server. The administrator has obtained multiple IP addresses for the array. Which of the following connection types is the server MOST likely using to connect to the array?
A. eSATA
B. USB
C. FC
D. iSCSI
A technician recently applied a patch to a working server. After rebooting, the technician notices the server is unable to connect to a nearby database server. The technician validates a connection can be made to the database from another host. Which of the following is the best NEXT step to restore connectivity?
A. Enable HIDS.
B. Change the service account permissions.
C. Check the firewall rules.
D. Roll back the applied patch.
A datacenter in a remote location lost power. The power has since been restored, but one of the servers has not come back online. After some investigation, the server is found to still be powered off. Which of the following is the BEST method to power on the server remotely?
A. Crash cart
B. Out-of-band console
C. IP KVM
D. RDP
A user is unable to modify files on a Windows fileshare. A technician examines the system and determines the user is a member of Group A. Group A was granted full control over the files. Which of the following is MOST likely causing the access issues?
A. SIEM policies
B. IDS rules
C. Share permissions
D. Firewall ports
Which of the following environmental controls must be carefully researched so the control itself does not cause the destruction of the server equipment?
A. Humidity control system
B. Sensors
C. Fire suppression
D. Heating system
A Linux server was recently updated. Now, the server stops during the boot process with a blank screen and an fs> prompt. Which of the following is the MOST likely cause of this issue?
A. The system is booting to a USB flash drive.
B. The UEFI boot was interrupted by a missing Linux boot file.
C. The BIOS could not find a bootable hard disk.
D. The BIOS firmware needs to be upgraded.
A systems administrator has several different types of hard drives. The administrator is setting up a NAS that will allow end users to see all the drives within the NAS. Which of the following storage types should the administrator use?
A. RAID array
B. Serial Attached SCSI
C. Solid-state drive
D. Just a bunch of disks
Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?
A. VBS
B. Shell
C. Java
D. PowerShell
E. Batch
Which of the following backup methods protects all the changes that have occurred since the last full backup?
A. Incremental
B. Archive
C. Differential
D. Snapshot
An administrator is helping to replicate a large amount of data between two Windows servers. The administrator is unsure how much data has already been transferred. Which of the following will BEST ensure all the data is copied consistently?
A. rsync
B. copy
C. scp
D. robocopy
A server administrator has configured a web server. Which of the following does the administrator need to install to make the website trusted?
A. PKI
B. SSL
C. LDAP
D. DNS
An administrator is investigating several unexpected documents and video files that recently appeared in a network share. The administrator checks the properties of the files and sees the author’s name on the documents is not a company employee. The administrator questions the other users, but no one knows anything about the files. The administrator then checks the log files and discovers the FTP protocol was used to copy the files to the server. Which of the following needs to be done to prevent this from happening again?
A. Implement data loss prevention.
B. Configure intrusion detection.
C. Turn on User Account Control.
D. Disable anonymous access.
A server technician notices a server is very low on disk space. Upon inspecting the disk utilization, the technician discovers server logs are taking up a large amount of space. There is no central log server. Which of the following would help free up disk space?
A. Log rotation
B. Log shipping
C. Log alerting
D. Log analysis
Access Full SK0-005 Exam Prep Free
Want to go beyond these 50 questions? Click here to unlock a full set of SK0-005 exam prep free questions covering every domain tested on the exam.
We continuously update our content to ensure you have the most current and effective prep materials.
Good luck with your SK0-005 certification journey!