An administrator is only able to log on to a server with a local account. The server has been successfully joined to the domain and can ping other servers by IP address.
Which of the following locally defined settings is MOST likely misconfigured?
A. DHCP
B. WINS
C. DNS
D. TCP
Which of the following BEST describes a security control that requires validating the user's physical characteristics?
A. OTP
B. Biometrics
C. RFID
D. Security cameras
An administrator has set up a GPO to disable USB drive access on a company's servers. The GPO is set up as a computer con guration policy and does not use security groups ltering. The administrator is testing to ensure the policy is working correctly. A server in the accounting OU works as expected, but a server in the sales OU is still allowing access to USB drives. The administrator runs the gpupdate /force command and tries again; however, the server still allows access to the USB drive.
Which of the following is the MOST likely cause?
A. The WMI filter is not configured properly.
B. Item-level targeting is not configured properly.
C. The scope is not configured properly.
D. Loopback processing is not configured properly.
A technician recently applied a patch to a working server. After rebooting, the technician notices the server is unable to connect to a nearby database server. The technician validates a connection can be made to the database from another host.
Which of the following is the best NEXT step to restore connectivity?
A. Enable HIDS.
B. Change the service account permissions.
C. Check the rewall rules.
D. Roll back the applied patch.
Users report they are unable to access an application after a recent third-party patch update. The physical server that is hosting the application keeps crashing on reboot. Although the update was installed directly from the manufacturer's support website as recommended, it has now been recalled and removed from the website, as the update unintentionally installed unauthorized software after a reboot.
Which of the following steps should the administrator perform to restore access to the application while minimizing downtime? (Choose two.)
A. Uninstall recent updates.
B. Reimage the server with a different OS.
C. Run a port scan to verify open ports.
D. Enable a GPO to uninstall the update.
E. Scan and remove any malware.
F. Reformat the server and restore the image from the latest backup.
An administrator is investigating a physical server that will not boot into the OS. The server has three hard drives configured in a RAID 5 array. The server passes POST, but the OS does not load. The administrator veri es the CPU and RAM are both seated correctly and checks the dual power supplies. The administrator then veri es all the BIOS settings are correct and connects a bootable USB drive in the server, and the OS loads correctly. Which of the following is causing the issue?
A. The page le is too small.
B. The CPU has failed.
C. There are multiple failed hard drives.
D. There are mismatched RAM modules.
E. RAID 5 requires four drives.
Which of the following load-balancing methods would be BEST described as each connection selecting the next path?
A. Least connection
B. Source hashed
C. Most recently used
D. Round robin
Which of the following should be configured in pairs on a server to provide network redundancy?
A. MRU
B. SCP
C. DLP
D. CPU
E. NIC
A new Windows server has been introduced to the network. The server administrator is trying to connect remotely to the server but is unsuccessful. Basic troubleshooting shows the server is visible on the network. Which of the following should be configured on the server to be able to connect remotely? (Choose two.)
A. Remote desktop connection
B. Remote procedure call
C. Remote assistance
D. Port 443
E. Port 3389
F. Port 5900
An administrator has been asked to verify that all tra c egressing from a company is secured. The administrator con rms all the information that is sent over the network is encrypted. Which of the following describes the type of tra c being encrypted?
A. Network encapsulation
B. Off-site data
C. Secure FTP
D. Data in transit
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SK0-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.