SK0-005 Practice Exam Free – 50 Questions to Simulate the Real Exam
Are you getting ready for the SK0-005 certification? Take your preparation to the next level with our SK0-005 Practice Exam Free – a carefully designed set of 50 realistic exam-style questions to help you evaluate your knowledge and boost your confidence.
Using a SK0-005 practice exam free is one of the best ways to:
- Experience the format and difficulty of the real exam
- Identify your strengths and focus on weak areas
- Improve your test-taking speed and accuracy
Below, you will find 50 realistic SK0-005 practice exam free questions covering key exam topics. Each question reflects the structure and challenge of the actual exam.
A server technician is placing a newly configured server into a corporate environment. The server will be used by members of the accounting department, who are currently assigned by the VLAN identified below:Which of the following IP address configurations should the technician assign to the new server so the members of the accounting group can access the server?
A. IP address: 172.16.25.90/24 -Default gateway: 172.16.25.254
B. IP address: 172.16.25.101/16 -Default gateway: 172.16.25.254
C. IP address: 172.16.25.254/24 -Default gateway: 172.16.25.1
D. IP address: 172.16.26.101/24 -Default gateway: 172.16.25.254
The network's IDS is giving multiple alerts that unauthorized traffic from a critical application server is being sent to a known-bad public IP address. One of the alerts contains the following information: Exploit Alert - Attempted User Privilege Gain - 2/2/07-3:09:09 10.1.200.32 --> 208.206.12.9:80 This server application is part of a cluster in which two other servers are also servicing clients. The server administrator has verified the other servers are not sending out traffic to that public IP address. The IP address subnet of the application servers is 10.1.200.0/26. Which of the following should the administrator perform to ensure only authorized traffic is being sent from the application server and downtime is minimized? (Choose two.)
A. Disable all services on the affected application server.
B. Perform a vulnerability scan on all the servers within the cluster and patch accordingly.
C. Block access to 208.206.12.9 from all servers on the network.
D. Change the IP address of all the servers in the cluster to the 208.206.12.0/26 subnet.
E. Enable GPO to install an antivirus on all the servers and perform a weekly reboot.
F. Perform an antivirus scan on all servers within the cluster and reboot each server.
A remote physical server is unable to communicate to the network through the available NICs, which were misconfigured. However, the server administrator is still able to configure the server remotely. Which of the following connection types is the server administrator using to access the server?
A. Out-of-band management
B. Crash cart access
C. Virtual administrator console
D. Local KVM setup
E. RDP connection
Users at a company are licensed to use an application that is restricted by the number of active sessions. Which of the following best describes this licensing model?
A. Per-server
B. Per-seat
C. Per-concurrent user
D. Per-core
Which of the following commands should a systems administrator use to create a batch script to map multiple shares?
A. nbtstat
B. net use
C. tracert
D. netstat
A systems administrator has been alerted to a zero-day vulnerability that is impacting a service enabled on a server OS. Which of the following would work BEST to limit an attacker from exploiting this vulnerability?
A. Installing the latest patches
B. Closing open ports
C. Enabling antivirus protection
D. Enabling a NIDS
A server administrator has been asked to implement a password policy that will help mitigate the chance of a successful brute-force attack. Which of the following password policies should the administrator implement first?
A. Lockout
B. Length
C. Complexity
D. Minimum age
A server administrator is installing a new server with multiple NICs on it. The Chief Information Officer has asked the administrator to ensure the new server will have the least amount of network downtime but a good amount of network speed. Which of the following best describes what the administrator should implement on the new server?
A. VLAN
B. vNIC
C. Link aggregation
D. Failover
Which of the following are measures that should be taken when a data breach occurs? (Choose two.)
A. Restore the data from backup.
B. Disclose the incident.
C. Disable unnecessary ports.
D. Run an antivirus scan.
E. Identify the exploited vulnerability.
F. Move the data to a different location.
Which of the following will correctly map a script to a home directory for a user based on username?
A. serverusers$username
B. server%username%
C. serverFirstInitialLastName
D. server$username$
Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster's functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task?
A. Heartbeat
B. Failback
C. Redundancy
D. Load balancing
The management team at a healthcare organization is concerned about being able to access the daily vital records if there is an IT disaster that causes both servers and the network to be offline. Which of the following backup types can the organization use to mitigate this risk?
A. Tape
B. Cloud
C. Disk
D. Print
A company is implementing a check-in desk to heighten physical security. Which of the following access controls would be the most appropriate to facilitate this implementation?
A. Security guards
B. Security cameras
C. Bollards
D. An access control vestibule
An administrator discovers a Bash script file has the following permissions set in octal notation: 777 Which of the following is the MOST appropriate command to ensure only the root user can modify and execute the script?
A. chmod go-rwx
B. chmod u=rwx
C. chmod u+wx
D. chmod g-rwx
A server administrator is completing an OS installation for a new server. The administrator patches the server with the latest vendor-suggested software, configures DHCP, and verifies all network cables are properly connected in the IDF, but there is no network connectivity. Which of the following is the MOST likely reason for the lack of connectivity?
A. The VLAN is improperly configured.
B. The DNS configuration is invalid.
C. The OS version is not compatible with the network switch vendor.
D. The HIDS is preventing the connection.
A hardware technician is installing 19 1U servers in a 42-unit rack. The technician needs to allocate enough space per server for optimal air flow. Which of the following unit sizes should be allocated per server?
A. 1U
B. 2U
C. 3U
D. 4U
A server administrator wants to check the open ports on a server. Which of the following commands should the administrator use to complete the task?
A. nslookup
B. nbtstat
C. telnet
D. netstat -a
A technician is configuring a server that requires secure remote access. Which of the following ports should the technician use?
A. 21
B. 22
C. 23
D. 443
A systems administrator is setting up a server on a LAN that uses an address space that follows the RFC 1918 standard. Which of the following IP addresses should the administrator use to be in compliance with the standard?
A. 11.251.196.241
B. 171.245.198.241
C. 172.16.19.241
D. 193.168.145.241
A systems administrator notices a newly added server cannot see any of the LUNs on the SAN. The SAN switch and the local HBA do not display any link lights. Which of the following is most likely the issue?
A. A single-mode fiber cable is used in place of multimode.
B. The switchport is on the wrong virtual SAN.
C. The HBA driver needs to be installed on the server.
D. The zoning on the fiber switch is wrong.
A technician is checking a server rack. Upon entering the room, the technician notices the fans on a particular server in the rack are running at high speeds. This is the only server in the rack that is experiencing this behavior. The ambient temperature in the room appears to be normal. Which of the following is the MOST likely reason why the fans in that server are operating at full speed?
A. The server is in the process of shutting down, so fan speed operations have been defaulted to high.
B. An incorrect fan size was inserted into the server, and the server has had to increase the fan speed to compensate.
C. A fan failure has occurred, and the other fans have increased speed to compensate.
D. The server is utilizing more memory than the other servers, so it has increased the fans to compensate.
Which of the following should be configured in pairs on a server to provide network redundancy?
A. MRU
B. SCP
C. DLP
D. CPU
E. NIC
Which of the following BEST describes overprovisioning in a virtual server environment?
A. Committing more virtual resources to virtual machines than there are physical resources present
B. Installing more physical hardware than is necessary to run the virtual environment to allow for future expansion
C. Allowing a virtual machine to utilize more resources than are allocated to it based on the server load
D. Ensuring there are enough physical resources to sustain the complete virtual environment in the event of a host failure
A site is considered a warm site when it:
A. has basic technical facilities connected to it.
B. has faulty air conditioning that is awaiting service.
C. is almost ready to take over all operations from the primary site.
D. is fully operational and continuously providing services.
A server has experienced several component failures. To minimize downtime, the server administrator wants to replace the components while the server is running. Which of the following can MOST likely be swapped out while the server is still running? (Choose two.)
A. The power supply
B. The CPU
C. The hard drive
D. The GPU
E. The cache
F. The RAM
A server administrator wants to ensure a storage array can survive the failure of two drives without the loss of data. Which of the following RAID levels should the administrator choose?
A. 0
B. 1
C. 5
D. 6
After the installation of an additional network card into a server, the server will not boot into the OS. A technician tests the network card in a different server with a different OS and verifies the card functions correctly. Which of the following should the technician do NEXT to troubleshoot this issue?
A. Remove the original network card and attempt to boot using only the new network card.
B. Check that the BIOS is configured to recognize the second network card.
C. Ensure the server has enough RAM to run a second network card.
D. Verify the network card is on the HCL for the OS.
A server administrator has been creating new VMs one by one. The administrator notices the system requirements are very similar, even with different applications. Which of the following would help the administrator accomplish this task in the SHORTEST amount of time and meet the system requirements?
A. Snapshot
B. Deduplication
C. System Restore
D. Template
A server administrator has received tickets from users who report the system runs very slowly and various unrelated messages pop up when they try to access an internet-facing web application using default ports. The administrator performs a scan to check for open ports and reviews the following report:Which of the following actions should the server administrator perform on the server?
A. Close ports 69 and 1010 and rerun the scan.
B. Close ports 80 and 443 and rerun the scan.
C. Close port 3389 and rerun the scan.
D. Close all ports and rerun the scan.
A technician is attempting to update a server's firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS. Which of the following should the technician do NEXT to install the firmware?
A. Press F8 to enter safe mode
B. Boot from the media
C. Enable HIDS on the server
D. Log in with an administrative account
An application needs 10GB of RAID 1 for log files, 20GB of RAID 5 for data files, and 20GB of RAID 5 for the operating system. All disks will be 10GB in capacity. Which of the following is the minimum number of disks needed for this application?
A. 6
B. 7
C. 8
D. 9
Ann, an administrator, has been troubleshooting a server issue. She carefully questioned the users and examined the available logs. Using this information, she was able to rule out several possible causes and develop a theory as to what the issue might be. Through further testing, her theory proved to be correct. Which of the following should be the NEXT step to troubleshoot the issue?
A. Document the findings and actions.
B. Escalate the issue to the management team.
C. Implement the solution.
D. Establish an action plan
An administrator is only able to log on to a server with a local account. The server has been successfully joined to the domain and can ping other servers by IP address. Which of the following locally defined settings is MOST likely misconfigured?
A. DHCP
B. WINS
C. DNS
D. TCP
A server administrator needs to implement load balancing without purchasing any new hardware or implementing any new software. Which of the following will the administrator MOST likely implement?
A. Round robin
B. Link aggregation
C. Most recently used
D. Heartbeat
SIMULATION - Users report that the FinanceApp software is not running, and they need immediate access. Issues with the FinanceApp software occur every week after the IT team completes server system updates. The users, however, do not want to contact the help desk every time the issue occurs. The users also report the new MarketApp software is not usable when it crashes, which can cause significant downtime. The technician who restarted the MarketApp software noticed it is running under a test account, which is a likely cause of the crashes. INSTRUCTIONS - Using the Services menu provided, modify the appropriate application services to remedy the stated issues. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
A company stores extremely sensitive data on an air-gapped system. Which of the following can be implemented to increase security against a potential insider threat?
A. Two-person integrity
B. SSO
C. SIEM
D. Faraday cage
E. MFA
An administrator is able to ping the default gateway and internet sites by name from a file server. The file server is not able to ping the print server by name. The administrator is able to ping the file server from the print server by both IP address and computer name. When initiating an nslookup from the file server for the print server, a different IP address is returned. Which of the following is most likely the cause?
A. Firewall is blocking the ICMP echo reply.
B. The DHCP scope option is income ct.
C. The DNS entries for the print server are incorrect.
D. The hosts file is misconfigured.
A systems administrator is setting up a second VLAN for end users. Which of the following should be provisioned for a DHCP server to be able to receive client requests from a different subnet?
A. DHCP options
B. NIC teaming
C. Zone transfers
D. Relay agent
E. VLAN ID
While running a local network security scan, an administrator discovers communication between clients and one of the web servers is happening in cleartext. Company policy requires all communication to be encrypted. Which of the following ports should be closed to stop the cleartext communication?
A. 21
B. 22
C. 443
D. 3389
A backup application is copying only changed files each time it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?
A. Open file
B. Synthetic full
C. Full incremental
D. Full differential
A change in policy requires a complete backup of the accounting server every seven days and a backup of modified data every day. Which of the following would be BEST to restore a full backup as quickly as possible in the event of a complete loss of server data?
A. A full, weekly backup with daily open-file backups
B. A full, weekly backup with daily archive backups
C. A full, weekly backup with daily incremental backups
D. A full, weekly backup with daily differential backups
A server administrator mounted a new hard disk on a Linux system with a mount point of /newdisk. It was later determined that users were unable to create directories or files on the new mount point. Which of the following commands would successfully mount the drive with the required parameters?
A. echo /newdisk >> /etc/fstab
B. net use /newdisk
C. mount ג€”o remount, rw /newdisk
D. mount ג€”a
A security manager is concerned that a rogue employee could boot a server from an outside USB drive. Which of the following actions can be taken to reduce this risk? (Choose two.)
A. Close unneeded ports.
B. Disable unneeded physical ports.
C. Set a BIOS password.
D. Install a SIEM.
E. Disable unneeded services.
F. Install a HIDS.
Users report they are unable to access an application after a recent third-party patch update. The physical server that is hosting the application keeps crashing on reboot. Although the update was installed directly from the manufacturer’s support website as recommended, it has now been recalled and removed from the website, as the update unintentionally installed unauthorized software after a reboot. Which of the following steps should the administrator perform to restore access to the application while minimizing downtime? (Choose two.)
A. Uninstall recent updates.
B. Reimage the server with a different OS.
C. Run a port scan to verify open ports.
D. Enable a GPO to uninstall the update.
E. Scan and remove any malware.
F. Reformat the server and restore the image from the latest backup.
Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?
A. VBS
B. Shell
C. Java
D. PowerShell
E. Batch
A systems administrator has noticed performance degradation on a company file server, and one of the disks on it has a solid amber light. The administrator logs on to the disk utility and sees the array is rebuilding. Which of the following should the administrator do NEXT once the rebuild is finished?
A. Restore the server from a snapshot.
B. Restore the server from backup.
C. Swap the drive and initialize the disk.
D. Swap the drive and initialize the array.
A server administrator is setting up a new payroll application. Compliance regulations require that all financial systems logs be stored in a central location. Which of the following should the administrator configure to ensure this requirement is met?
A. Alerting
B. Retention
C. Shipping
D. Rotation
Which of the following is the BEST action to perform before applying patches to one of the hosts in a high availability cluster?
A. Disable the heartbeat network.
B. Fallback cluster services.
C. Set the cluster to active-active.
D. Failover all VMs.
Which of the following licensing models was created by software companies in response to the increasing density of processors?
A. Per-instance
B. Per-server
C. Per-user
D. Per-core
The accounting department needs more storage and wants to retain the current data for quick read-write access. The accounting server does not have any internal drive bays available to keep both disks; however, the server does have USB 3.0 and eSATA ports available. Which of the following is the best way to accomplish the department's goals?
A. Copy the existing data to an external USB 3.0 enclosure.
B. Place the existing data on a DVD and use the internal DVD-ROM drive.
C. Transfer the existing data to an external eSATA enclosure.
D. Move the existing data to a new, larger internal hard drive.
Free Access Full SK0-005 Practice Exam Free
Looking for additional practice? Click here to access a full set of SK0-005 practice exam free questions and continue building your skills across all exam domains.
Our question sets are updated regularly to ensure they stay aligned with the latest exam objectives—so be sure to visit often!
Good luck with your SK0-005 certification journey!