CompTIA Server+ SK0-005 – Question090

A technician has received multiple reports of issues with a server. The server occasionally has a BSOD, powers off unexpectedly, and has fans that run continuously. Which of the following BEST represents what the technician should investigate during troubleshooting?

A.
Firmware incompatibility
B. CPU overheating
C. LED indicators
D. ESD issues

Correct Answer: B

Explanation:

Explanation:
Unexpected shutdowns. If the system is randomly shutting down or rebooting, the most likely cause is a heat problem.
Reference: https://www.microsoftpressstore.com/articles/article.aspx?p=2224043…

CompTIA Server+ SK0-005 – Question089

A server administrator needs to create a new folder on a file server that only specific users can access. Which of the following BEST describes how the server administrator can accomplish this task?

A.
Create a group that includes all users and assign it to an ACL.
B. Assign individual permissions on the folder to each user.
C. Create a group that includes all users and assign the proper permissions.
D. Assign ownership on the folder for each user.

Correct Answer: C

Explanation:

Explanation:
The top portion of the dialog box lists the users and/or groups that have access to the file or folder.
Reference: https://www.uwec.edu/kb/article/drives-establishing-windows-file-an…

CompTIA Server+ SK0-005 – Question088

Users at a company work with highly sensitive data. The security department implemented an administrative and technical control to enforce least-privilege access assigned to files. However, the security department has discovered unauthorized data exfiltration. Which of the following is the BEST way to protect the data from leaking?

A.
Utilize privacy screens.
B. Implement disk quotas.
C. Install a DLP solution.
D. Enforce the lock-screen feature.

Correct Answer: C

Explanation:

Explanation:
Components of a Data Loss Solution
Reference: https://www.imperva.com/learn/data-security/data-loss-prevention-dlp/

CompTIA Server+ SK0-005 – Question087

A server administrator is configuring a new server that will hold large amounts of information. The server will need to be accessed by multiple users at the same time. Which of the following server roles will the administrator MOST likely need to install?

A.
Messaging
B. Application
C. Print
D. Database

Correct Answer: D

Explanation:

Explanation:
Few people are expected to use the database at the same time and users don’t need to customize the design of the database.
Reference: https://support.microsoft.com/en-us/office/ways-to-share-an-access-…

CompTIA Server+ SK0-005 – Question086

A server administrator is configuring the IP address on a newly provisioned server in the testing environment.
The network VLANs are configured as follows:

The administrator configures the IP address for the new server as follows:
IP address: 192.168.1.1/24
Default gateway: 192.168.10.1
A ping sent to the default gateway is not successful. Which of the following IP address/default gateway combinations should the administrator have used for the new server?

A.
IP address: 192.168.10.2/24 Default gateway: 192.168.10.1
B. IP address: 192.168.1.2/24 Default gateway: 192.168.10.1
C. IP address: 192.168.10.3/24 Default gateway: 192.168.20.1
D. IP address: 192.168.10.24/24 Default gateway: 192.168.30.1

Correct Answer: B

CompTIA Server+ SK0-005 – Question085

The Chief Information Officer (CIO) of a datacenter is concerned that transmissions from the building can be detected from the outside. Which of the following would resolve this concern? (Choose two.)

A.
RFID
B. Proximity readers
C. Signal blocking
D. Camouflage
E. Reflective glass
F. Bollards

Correct Answer: AB

Explanation:

Explanation:
RFID is an acronym for “radio-frequency identification” and refers to a technology whereby digital data encoded in RFID tags or smart labels (defined below) are captured by a reader via radio waves.
Proximity readers work by constantly emitting a short range radio frequency (RF) field. When a proximity card comes within range of this field, an integrated chip within the card is powered up and the chip transmits a card number back to the reader. Not all proximity cards are born equal though, and it is important that the differences are weighed up when making a decision about which technology to adopt.
Reference: https://www.abr.com/what-is-rfid-how-does-rfid-work/#:~:text=RFID%2…
https://www.ict.co/Choosing-Card-Technology

CompTIA Server+ SK0-005 – Question084

A global organization keeps personnel application servers that are local to each country. However, a security audit shows these application servers are accessible from sites in other countries. Which of the following hardening techniques should the organization use to restrict access to only sites that are in the same country?

A.
Configure a firewall
B. Close the unneeded ports
C. Install a HIDS
D. Disable unneeded services.

Correct Answer: A

Explanation:

Explanation:
Monitors Network Traffic
Reference: https://www.fortinet.com/resources/cyberglossary/benefits-of-firewall

CompTIA Server+ SK0-005 – Question083

A server administrator needs to deploy five VMs, all of which must have the same type of configuration. Which of the following would be the MOST efficient way to perform this task?

A.
Snapshot a VM.
B. Use a physical host.
C. Perform a P2V conversion.
D. Use a VM template.

Correct Answer: D

Explanation:

Explanation:
Deploying a virtual machine from a template creates a virtual machine that is a copy of the template. The new virtual machine has the virtual hardware, installed software, and other properties that are configured for the template.
Reference: https://docs.vmware.com/en/VMware-vSphere/6.7/com.vmware.vsphere.vm…

CompTIA Server+ SK0-005 – Question082

A snapshot is a feature that can be used in hypervisors to:

A.
roll back firmware updates.
B. restore to a previous version.
C. roll back application drivers.
D. perform a backup restore.

Correct Answer: D

Explanation:

Explanation:
Hypervisor-based snapshots provide a way to take an image copy of a virtual machine (VM), either to access and restore individual files, provide a rollback point to restore the VM, or to clone the VM to another virtual machine.
Reference: https://www.computerweekly.com/feature/Snapshots-Hypervisor-vs-Array

CompTIA Server+ SK0-005 – Question081

Which of the following steps in the troubleshooting theory should be performed after a solution has been implemented? (Choose two.)

A.
Perform a root cause analysis
B. Develop a plan of action
C. Document the findings
D. Escalate the issue
E. Scope the issue
F. Notify the users

Correct Answer: CF