SK0-005 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills
Are you preparing for the SK0-005 certification exam? Kickstart your success with our SK0-005 Practice Questions Free – a carefully selected set of 50 real exam-style questions to help you test your knowledge and identify areas for improvement.
Practicing with SK0-005 practice questions free gives you a powerful edge by allowing you to:
- Understand the exam structure and question formats
- Discover your strong and weak areas
- Build the confidence you need for test day success
Below, you will find 50 free SK0-005 practice questions designed to match the real exam in both difficulty and topic coverage. They’re ideal for self-assessment or final review. You can click on each Question to explore the details.
An administrator is troubleshooting a RAID issue in a failed server. The server reported a drive failure, and then it crashed and would no longer turn on. There are two arrays on the failed server: a two-drive RAID 0 set for the OS, and an eight-drive RAID 10 set for data. Which of the following failure scenarios MOST likely occurred?
A. A drive failed in the OS array.
B. A drive failed and then recovered in the data array.
C. A drive failed in both of the arrays.
D. A drive failed in the data array.
A new virtual server was deployed in a perimeter network. Users have reported the time on the server has been incorrect. The engineer has verified the configuration, and the internal time servers are configured properly. Which of the following should the engineer do to resolve this issue?
A. Check the firewall rules.
B. Replace the CMOS battery in the server.
C. Restart the time servers.
D. Manually correct the time.
A technician has received tickets reporting a server is responding slowly during business hours. Which of the following should the technician implement so the team will be informed of this behavior in real time?
A. Log rotation
B. Alerts
C. Reports
D. Log shipping
A server administrator is gathering business requirements to determine how frequently backups need to be performed on an application server. Which of the following is the administrator attempting to establish?
A. MTBF
B. RPO
C. MTTR
D. RFC
After installing an OS on a new server, the administrator realizes the server does not have any network connectivity. The administrator checks the network cable, and it seems to be transferring data. Which of the following should be checked next?
A. NIC firmware
B. IPv4 options
C. DHCP options
D. Firewall options
E. DNS settings
A server administrator is connecting a Linux server to a storage array. The administrator wants to use a file-based storage protocol to store data on the server. Which of the following protocols will the administrator MOST likely use?
A. NFS
B. FCoE
C. iSCSI
D. CIFS
A server administrator needs to configure a server on a network that will have no more than 30 available IP addresses. Which of the following subnet addresses will be the MOST efficient for this network?
A. 255.255.255.0
B. 255.255.255.128
C. 255.255.255.224
D. 255.255.255.252
Which of the following BEST describes overprovisioning in a virtual server environment?
A. Committing more virtual resources to virtual machines than there are physical resources present
B. Installing more physical hardware than is necessary to run the virtual environment to allow for future expansion
C. Allowing a virtual machine to utilize more resources than are allocated to it based on the server load
D. Ensuring there are enough physical resources to sustain the complete virtual environment in the event of a host failure
A VLAN needs to be configured within a virtual environment for a new VM. Which of the following will ensure the VM receives a correct IP address?
A. A virtual router
B. A host NIC
C. AVPN
D. A virtual switch
E. A vNIC
A server administrator is configuring the IP address on a newly provisioned server in the testing environment. The network VLANs are configured as follows:The administrator configures the IP address for the new server as follows: IP address: 192.168.1.1/24 - Default gateway: 192.168.10.1 - A ping sent to the default gateway is not successful. Which of the following IP address/default gateway combinations should the administrator have used for the new server?
A. IP address: 192.168.10.2/24 Default gateway: 192.168.10.1
B. IP address: 192.168.1.2/24 Default gateway: 192.168.10.1
C. IP address: 192.168.10.3/24 Default gateway: 192.168.20.1
D. IP address: 192.168.10.24/24 Default gateway: 192.168.30.1
A technician has several possible solutions to a reported server issue. Which of the following BEST represents how the technician should proceed with troubleshooting?
A. Determine whether there is a common element in the symptoms causing multiple problems.
B. Perform a root cause analysis.
C. Make one change at a time and test.
D. Document the findings, actions, and outcomes throughout the process.
An administrator is able to ping the default gateway and internet sites by name from a file server. The file server is not able to ping the print server by name. The administrator is able to ping the file server from the print server by both IP address and computer name. When initiating an nslookup from the file server for the print server, a different IP address is returned. Which of the following is most likely the cause?
A. Firewall is blocking the ICMP echo reply.
B. The DHCP scope option is income ct.
C. The DNS entries for the print server are incorrect.
D. The hosts file is misconfigured.
A server is performing slowly, and users are reporting issues connecting to the application on that server. Upon investigation, the server administrator notices several unauthorized services running on that server that are successfully communicating to an external site. Which of the following are MOST likely causing the issue? (Choose two.)
A. Adware is installed on the users’ devices
B. The firewall rule for the server is misconfigured
C. The server is infected with a virus
D. Intrusion detection is enabled on the network
E. Unnecessary services are disabled on the server
F. SELinux is enabled on the server
A server administrator needs to check remotely for unnecessary running services across 12 servers. Which of the following tools should the administrator use?
A. DLP
B. A port scanner
C. Anti-malware
D. A sniffer
An administrator notices that a file server is filling up quickly but has many of the same files in different directories. Which of the following storage management techniques would resolve this issue?
A. Provisioning
B. Encryption
C. Deduplication
D. Partitioning
An administrator is designing a server for use in a factory environment that contains many pieces of large electrical equipment. Which of the following would be the BEST type of cable for the administrator to use to minimize networking issues?
A. Coaxial
B. Cat 5
C. Cat 6
D. Fiber optic
An administrator is alerted to a hardware failure in a mission-critical server. The alert states that two drives have failed. The administrator notes the drives are in different RAID 1 arrays, and both are hot-swappable. Which of the following steps will be the MOST efficient?
A. Replace one drive, wait for a rebuild, and replace the next drive.
B. Shut down the server and replace the drives.
C. Replace both failed drives at the same time.
D. Replace all the drives in both degraded arrays.
Ann, an administrator, is configuring a two-node cluster that will be deployed. To check the cluster's functionality, she shuts down the active node. Cluster behavior is as expected, and the passive node is now active. Ann powers on the server again and wants to return to the original configuration. Which of the following cluster features will allow Ann to complete this task?
A. Heartbeat
B. Failback
C. Redundancy
D. Load balancing
Which of the following licensing concepts is based on the number of logical processors a server has?
A. Per core
B. Per socket
C. Per instance
D. Per server
A backup application is copying only changed files each time it runs. During a restore, however, only a single file is used. Which of the following backup methods does this describe?
A. Open file
B. Synthetic full
C. Full incremental
D. Full differential
Ann, an administrator, has been troubleshooting a server issue. She carefully questioned the users and examined the available logs. Using this information, she was able to rule out several possible causes and develop a theory as to what the issue might be. Through further testing, her theory proved to be correct. Which of the following should be the NEXT step to troubleshoot the issue?
A. Document the findings and actions.
B. Escalate the issue to the management team.
C. Implement the solution.
D. Establish an action plan
A server technician arrives at a data center to troubleshoot a physical server that is not responding to remote management software. The technician discovers the servers in the data center are not connected to a KVM switch, and their out-of-band management cards have not been configured. Which of the following should the technician do to access the server for troubleshooting purposes?
A. Connect the diagnostic card to the PCIe connector.
B. Connect a console cable to the server NIC.
C. Connect to the server from a crash cart.
D. Connect the virtual administration console.
A server administrator has noticed that the storage utilization on a file server is growing faster than planned. The administrator wants to ensure that, in the future, there is a more direct relationship between the number of users using the server and the amount of space that might be used. Which of the following would BEST enable this correlation?
A. Partitioning
B. Deduplication
C. Disk quotas
D. Compression
The management team has mandated the use of data-at-rest encryption on all corporate servers. Using this encryption paradigm will ensure:
A. website traffic is protected while traversing the internet.
B. files stored on the server are protected against physical theft.
C. attachments that are emailed from this server cannot be intercepted.
D. databases in use are protected from remote hackers.
Which of the following life-cycle management phases deals with a server that is no longer in operation?
A. End-of-life
B. Disposal
C. Usage
D. Procurement
A company's IDS has identified outbound traffic from one of the web servers coming over port 389 to an outside address. This server only hosts websites. The company's SOC administrator has asked a technician to harden this server. Which of the following would be the BEST way to complete this request?
A. Disable port 389 on the server
B. Move traffic from port 389 to port 443
C. Move traffic from port 389 to port 637
D. Enable port 389 for web traffic
Which of the following tools will analyze network logs in real time to report on suspicious log events?
A. Syslog
B. DLP
C. SIEM
D. HIPS
An administrator has been asked to increase the storage capacity of a stand-alone file server, but no further expansion slots are available. Which of the following would be the FASTEST solution to implement with no downtime?
A. Configure a RAID array.
B. Replace the current drives with higher-capacity disks.
C. Implement FCoE for more storage capacity.
D. Connect the server to a SAN.
A server administrator is experiencing difficulty configuring MySQL on a Linux server. The administrator issues the getenforce command and receives the following output: ># Enforcing Which of the following commands should the administrator issue to configure MySQL successfully?
A. setenforce 0
B. setenforce permissive
C. setenforce 1
D. setenforce disabled
A company wants to find an affordable way to simulate a fail over of a critical application. The company does not currently have a solution for it. The application consists of 15 servers, and the company would like to simulate on production configurations and IP address schemes. Which of the following would be the most cost-effective solution?
A. Build a warm site and perform a fail over of the application.
B. Build a cloud IaaS and perform a fail over of the application.
C. Build a hot site and perform a fail over of the application.
D. Build a cold site and perform a fail over of the application.
E. Perform a tabletop fail over of the application.
A systems administrator is trying to determine why users in the human resources department cannot access an application server. The administrator reviews the application logs but does not see any attempts by the users to access the application. Which of the following is preventing the users from accessing the application server?
A. NAT
B. ICMP
C. VLAN
D. NIDS
The management team has mandated the use of data-at-rest encryption for all data. Which of the following forms of encryption best achieves this goal?
A. Drive
B. Database
C. Folder
D. File
An administrator gave Ann modify permissions to a shared folder called DATA, which is located on the company server. Other users need read access to the files in this folder. The current configuration is as follows:The administrator has determined Ann cannot write anything to the DATA folder using the network. Which of the following would be the best practice to set up Ann's permissions correctly, exposing only the minimum rights required?
A.
B.
C.
D.
The network's IDS is giving multiple alerts that unauthorized traffic from a critical application server is being sent to a known-bad public IP address. One of the alerts contains the following information: Exploit Alert - Attempted User Privilege Gain - 2/2/07-3:09:09 10.1.200.32 --> 208.206.12.9:80 This server application is part of a cluster in which two other servers are also servicing clients. The server administrator has verified the other servers are not sending out traffic to that public IP address. The IP address subnet of the application servers is 10.1.200.0/26. Which of the following should the administrator perform to ensure only authorized traffic is being sent from the application server and downtime is minimized? (Choose two.)
A. Disable all services on the affected application server.
B. Perform a vulnerability scan on all the servers within the cluster and patch accordingly.
C. Block access to 208.206.12.9 from all servers on the network.
D. Change the IP address of all the servers in the cluster to the 208.206.12.0/26 subnet.
E. Enable GPO to install an antivirus on all the servers and perform a weekly reboot.
F. Perform an antivirus scan on all servers within the cluster and reboot each server.
Which of the following licensing models was created by software companies in response to the increasing density of processors?
A. Per-instance
B. Per-server
C. Per-user
D. Per-core
A server administrator just installed a new physical server and needs to harden the applications on the server. Which of the following best describes a method of application hardening?
A. Install the latest patches.
B. Disable unneeded hardware.
C. Set the boot order.
D. Enable a BIOS password.
A server administrator is installing servers in a rack that does not have rack unit markings on the sides. The available open space for the new servers is approximately 3.5in (8.9cm) high. Which of the following is the LARGEST server size that can fit in this space?
A. 1U
B. 2U
C. 3U
D. 4U
A server in a remote data center is no longer responsive. Which of the following is the BEST solution to investigate this failure?
A. Remote desktop
B. Access via a crash cart
C. Out-of-band management
D. A Secure Shell connection
Which of the following commands would MOST likely be used to register a new service on a Windows OS?
A. set-service
B. net
C. sc
D. services.msc
Users cannot access a new server by name, but the server does respond to a ping request using its IP address. All the user workstations receive their IP information from a DHCP server. Which of the following would be the best step to perform NEXT?
A. Run the tracert command from a workstation.
B. Examine the DNS to see if the new server record exists.
C. Correct the missing DHCP scope.
D. Update the workstation hosts file.
A server administrator needs to implement load balancing without purchasing any new hardware or implementing any new software. Which of the following will the administrator MOST likely implement?
A. Round robin
B. Link aggregation
C. Most recently used
D. Heartbeat
Which of the following BEST describes the metric that is used to measure server downtime?
A. MTTR
B. BIA
C. RPO
D. SLA
A security technician generated a public/private key pair on a server. The technician needs to copy the key pair to another server on a different subnet. Which of the following is the MOST secure method to copy the keys?
A. HTTP
B. FTP
C. SCP
D. USB
Several new components have been added to a mission-critical server, and corporate policy states all new components must meet server hardening requirements. Which of the following should be applied?
A. Definition updates
B. Driver updates
C. OS security updates
D. Application updates
A systems administrator has noticed performance degradation on a company file server, and one of the disks on it has a solid amber light. The administrator logs on to the disk utility and sees the array is rebuilding. Which of the following should the administrator do NEXT once the rebuild is finished?
A. Restore the server from a snapshot.
B. Restore the server from backup.
C. Swap the drive and initialize the disk.
D. Swap the drive and initialize the array.
A technician is attempting to update a server's firmware. After inserting the media for the firmware and restarting the server, the machine starts normally into the OS. Which of the following should the technician do NEXT to install the firmware?
A. Press F8 to enter safe mode
B. Boot from the media
C. Enable HIDS on the server
D. Log in with an administrative account
A hardware technician is installing 19 1U servers in a 42-unit rack. The technician needs to allocate enough space per server for optimal air flow. Which of the following unit sizes should be allocated per server?
A. 1U
B. 2U
C. 3U
D. 4U
A datacenter in a remote location lost power. The power has since been restored, but one of the servers has not come back online. After some investigation, the server is found to still be powered off. Which of the following is the BEST method to power on the server remotely?
A. Crash cart
B. Out-of-band console
C. IP KVM
D. RDP
A security manager is concerned that a rogue employee could boot a server from an outside USB drive. Which of the following actions can be taken to reduce this risk? (Choose two.)
A. Close unneeded ports.
B. Disable unneeded physical ports.
C. Set a BIOS password.
D. Install a SIEM.
E. Disable unneeded services.
F. Install a HIDS.
Network connectivity to a server was lost when it was pulled from the rack during maintenance. Which of the following should the server administrator use to prevent this situation in the future?
A. Cable management
B. Rail kits
C. A wireless connection
D. A power distribution unit
Free Access Full SK0-005 Practice Questions Free
Want more hands-on practice? Click here to access the full bank of SK0-005 practice questions free and reinforce your understanding of all exam objectives.
We update our question sets regularly, so check back often for new and relevant content.
Good luck with your SK0-005 certification journey!