Which of the following commands would MOST likely be used to register a new service on a Windows OS?
A. set-service
B. net
C. sc
D. services.msc
Correct Answer: C
The command that would most likely be used to register a new service on a Windows OS is "sc".
"sc" is a command-line utility that is used to manage Windows services. It can be used to create, modify, start, stop, and delete services, among other things. The "create" command in particular is used to create a new service.
The other options listed (A, B, and D) are not used specifically for registering new services. "set-service" is used to modify the settings of an existing service, "net" is used for managing network resources, and "services.msc" is a graphical
user interface (GUI) tool for managing services.
Question 362:
Which of the following physical security concepts would most likely be used to limit personnel access to a restricted area within a data center?
A. An access control vestibule
B. Video surveillance
C. Bollards
D. Data center camouflage
Correct Answer: A
Question 363:
A server administrator is connecting a new storage array to a server. The administrator has obtained multiple IP addresses for the array. Which of the following connection types is the server MOST likely using to connect to the array?
A. eSATA
B. USB
C. FC
D. iSCSI
Correct Answer: D
Based on the multiple IP addresses obtained for the storage array, the server is most likely using the iSCSI (Internet Small Computer System Interface) connection type to connect to the array. iSCSI is a protocol that allows SCSI commands to be sent over IP networks, and it typically uses IP addresses to identify and connect to storage devices over a network.
Option A (eSATA) and B (USB) are both direct-attached storage (DAS) connection types that use a cable to connect the storage device directly to the server, rather than over a network. Option C (FC) is Fibre Channel, which is a network protocol for connecting storage devices to servers over a high-speed Fibre Channel network, but it typically uses Fibre Channel addresses (WWNs) rather than IP addresses to identify and connect to devices.
Question 364:
A newly installed server is accessible to local users, but remote users are unable to connect. Which of the following is MOST likely misconfigured?
A. The IP address
B. The default gateway
C. The VLAN
D. The subnet mask
Correct Answer: B
This is the most likely misconfigured setting because the default gateway is the router that connects the local network to other networks. If the default gateway is incorrect, the server will not be able to communicate with remote users or devices outside its own subnet.
A user logs in to a Linux server and attempts to run the following command:
sudo emacs /root/file
However, the user gets the following message:
User userid is not allowed to execute `emacs' on this server.
Which of the following would BEST allow the user to find out which commands can be used?
A. visudo | grep userid
B. sudo -1 -U userid
C. cat /etc/passwd
D. userlist | grep userid
Correct Answer: B
The BEST option to allow the user to find out which commands can be used is option B: sudo -1 -U userid.
This command allows the user to run a shell with the privileges of the specified user (-U userid) while preserving their own environment (-i). This means that the user will be able to see the commands they are authorized to run, and also
allows them to test running those commands as the authorized user.
Option A (visudo | grep userid) runs the visudo command with the intention of displaying the sudoers file contents that have configuration options for the specified user, but it will not show the available commands.
Option C (cat /etc/passwd) shows the contents of the /etc/passwd file, which contains user account information including usernames, user IDs, home directories, and login shells. However, it will not show the commands that the user can run.
Option D (userlist | grep userid) does not seem to be a valid command and would not help the user find the available commands they can run.
Question 366:
A VLAN needs to be configured within a virtual environment for a new VM. Which of the following will ensure the VM receives a correct IP address?
A. A virtual router
B. A host NIC
C. AVPN
D. A virtual switch
E. A vNIC
Correct Answer: E
E. A vNIC (virtual network interface card) is what connects a VM to a virtual network, and it is responsible for sending and receiving network traffic. When a VLAN needs to be configured within a virtual environment for a new VM, creating a vNIC with the correct VLAN configuration will ensure that the VM receives a correct IP address within that VLAN. The virtual switch is what connects the vNIC to the physical network, and a virtual router may be necessary if the VLAN is to communicate with other networks or the Internet, but neither of these options specifically ensures that the VM receives a correct IP address. AVPN (Amazon Virtual Private Network) is a networking solution provided by Amazon Web Services and is not relevant to this scenario unless the virtual environment is hosted on AWS. A host NIC (network interface card) is a physical network adapter on the host machine and is not directly related to configuring a VLAN for a virtual environment.
Question 367:
A senior administrator instructs a technician to run the following script on a Linux server:
for i in {1..65536}; do echo $i; telnet localhost $i; done
The script mostly returns the following message: Connection refused. However, there are several entries in the console display that look like this:
1.
Connected to localhost
2.
Connected to localhost
Which of the following actions should the technician perform NEXT?
A. Look for an unauthorized HTTP service on this server.
B. Look for a virus infection on this server.
C. Look for an unauthorized Telnet service on this server.
D. Look for an unauthorized port scanning service on this server.
Correct Answer: A
The script that the technician is running is trying to connect to every port on the localhost (the same machine) using telnet, a network protocol that allows remote access to a command-line interface. The script mostly fails because most ports are closed or not listening for connections. However, the script succeeds on ports 80 and 443, which are the default ports for HTTP and HTTPS protocols, respectively. These protocols are used for web services and web browsers. Therefore, the technician should look for an unauthorized HTTP service on this server, as it may indicate a security breach or a misconfiguration. Looking for a virus infection on this server is also possible, but not the most likely source of the issue. Looking for an unauthorized Telnet service on this server is not relevant, as the script is using telnet as a client, not a server. Looking for an unauthorized port scanning service on this server is not relevant, as the script is scanning ports on the localhost, not on other machines. References: https://phoenixnap.com/kb/telnet-windows https://www.techopedia.com/definition/23337/http-port-80 https://www.techopedia.com/definition/23336/https-port-443
Question 368:
A technician learns users are unable to log in to a Linux server with known-working LDAP credentials. The technician logs in to the server with a local account and confirms the system is functional, can communicate over the network, and is configured correctly. However, the server log has entries regarding Kerberos errors.
Which of the following is the MOST likely source of the issue?
A. A local firewall is blocking authentication requests.
B. The users have expired passwords.
C. The system clock is off by more than five minutes.
D. The server has no access to the LDAP host.
Correct Answer: C
The most likely source of the issue in this scenario is that the system clock is off by more than five minutes.
Kerberos is a network authentication protocol that relies on a shared secret between the client and server, as well as a trusted third-party server that provides authentication services. One of the requirements for proper functioning of Kerberos
is that the clocks of the client, server, and third-party server must be synchronized within a certain tolerance. If the clocks are out of sync by more than five minutes, authentication requests will fail.
Option A, a local firewall blocking authentication requests, is possible, but unlikely given that the server log has entries regarding Kerberos errors.
Option B, users having expired passwords, would not result in Kerberos errors, but would result in authentication failure messages.
Option D, the server having no access to the LDAP host, is possible, but unlikely given that the technician confirmed that the system is able to communicate over the network and is configured correctly.
Question 369:
Hosting data in different regional locations but not moving it for long periods of time describes:
A. a cold site.
B. data at rest.
C. on-site retention.
D. off-site storage.
Correct Answer: B
The term that describes hosting data in different regional locations but not moving it for long periods of time is "data at rest".
Data at rest refers to data that is not actively being used or transmitted, but is instead stored in a particular location or on a particular device. This can include data that is stored on hard drives, flash drives, or other storage media, as well as
data that is stored in the cloud or on remote servers.
Option A, a cold site, refers to a backup facility that is not operational until a disaster occurs and is typically used for disaster recovery purposes.
Option C, on-site retention, refers to the practice of storing data on site, typically for regulatory or compliance purposes.
Option D, off-site storage, refers to the practice of storing data in a location other than the primary data center, typically for backup or disaster recovery purposes.
Question 370:
An administrator is configuring a new server for use as a database server. It will have two mirrored drives to hold the operating system, and there will be three drive bays remaining for storage. Which of the following RAID levels will yield the BEST combination of available space and redundancy?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10
Correct Answer: C
The RAID level that would yield the BEST combination of available space and redundancy in this scenario is RAID 5.
RAID 0 provides no redundancy and would not be a suitable choice for a database server where data protection is crucial.
RAID 1 provides disk redundancy by mirroring two drives but would result in only half of the total storage capacity being available. In this case, the three remaining drive bays would provide less storage than RAID 5.
RAID 10 provides both disk redundancy and increased storage capacity by combining mirroring and striping. However, since there are only three remaining drive bays, it would not be possible to set up RAID 10.
RAID 5 provides a good balance of storage capacity and disk redundancy by striping data across multiple disks with parity data distributed among the disks. This configuration requires at least three drives and can withstand the failure of one
disk. In this scenario, RAID 5 would provide the best balance of available space and redundancy for the remaining three drive bays.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SK0-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.