Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

SK0-005 CompTIA Server+ Certification Exam Free Practice Exam Questions (2025 Updated)

Prepare effectively for your CompTIA SK0-005 CompTIA Server+ Certification Exam certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 8
Total 493 questions

A technician is attempting to reboot a remote physical Linux server. However, attempts to command a shutdown -----now result in the loss of the SSH connection. The server still responds to pings. Which of the following should the technician use to command a remote shutdown?

A.

virtual serial console

B.

A KVM

C.

An IDRAC

D.

A crash cart

Which of the following BEST describes the concept of right to downgrade?

A.

It allows for the return of a new OS license if the newer OS is not compatible with the currently installed software and is returning to the previously used OS

B.

It allows a server to run on fewer resources than what is outlined in the minimum requirements document without purchasing a license

C.

It allows for a previous version of an OS to be deployed in a test environment for each current license that is purchased

D.

It allows a previous version of an OS to be installed and covered by the same license as the newer version

A server administrator has connected a new server to the network. During testing, the administrator discovers the server is not reachable via server but can be accessed by IP address. Which of the following steps should the server administrator take NEXT? (Select TWO).

A.

Check the default gateway.

B.

Check the route tables.

C.

Check the hosts file.

D.

Check the DNS server.

E.

Run the ping command.

F.

Run the tracert command

Which of the following technologies would allow an administrator to build a software RAID on a Windows server?

A.

Logical volume management

B.

Dynamic disk

C.

GPT

D.

UEFI

A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?

A.

User account control

B.

Anti-malware

C.

A sniffer

D.

A port scanner

A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials.The administrator logs on using the local administrator account and verifies the server has the correct IP address, subnet mask, and default gateway. The administrator then gets on another server and can ping the new server. Which of the following is causing the issue?

A.

Port 443 is not open on the firewall

B.

The server is experiencing a downstream failure

C.

The local hosts file is blank

D.

The server is not joined to the domain

Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits?

A.

Bollards

B.

Reflective glass

C.

Security guards

D.

Security cameras

A server that recently received hardware upgrades has begun to experience random BSOD conditions. Which of the following are likely causes of the issue? (Choose two.)

A.

Faulty memory

B.

Data partition error

C.

Incorrectly seated memory

D.

Incompatible disk speed

E.

Uninitialized disk

F.

Overallocated memory

Due to a recent application migration, a company’s current storage solution does not meet the necessary requirements tor hosting data without impacting performance when the data is accessed in real time by multiple users. Which of the following is the BEST solution for this Issue?

A.

Install local external hard drives for affected users.

B.

Add extra memory to the server where data is stored.

C.

Compress the data to increase available space.

D.

Deploy a new Fibre Channel SAN solution.

An administrator is tasked with building an environment consisting of four servers that can each serve the same website. Which of the following concepts is described?

A.

Load balancing

B.

Direct access

C.

Overprovisioning

D.

Network teaming

An administrator is rebooting servers manually after a group of updates were deployed through SCCM. The administrator notices several of the servers did not receive the deployed update. Which of the following should the administrator review first?

A.

Confirm the server has the current OS updates and security patches installed.

B.

Confirm the server OS has a valid Active Directory account.

C.

Confirm the server does not have the firewall running.

D.

Confirm the server is in the collection scheduled to receive the update.

A technician is troubleshooting a database server that has 12 external disk arrays. Multiple disks are in a degraded state. The server is in a remote colocation facility and has on-site support. The technician notices all of the external storage arrays are degraded, but the internal arrays are functional. Which of the following steps should the technician take next to quickly address this issue?

A.

Notify the users of the downtime and reboot the server from the RDP connection.

B.

Notify the management team about the issue and travel to the colocation site with spare disks and RAID controllers.

C.

Access the server with RDP and start the RAID utility software to rebuild the arrays.

D.

Restore the data for the affected disks and notify the users of the estimated recovery time.

A systems administrator is selecting an authentication system for a data center. The company’s security policy requires that the system support MFA. Which of the following options should the administrator deploy to meet the policy requirements?

A.

A retinal scan and a fingerprint reader

B.

A key fob and an employee badge

C.

An RFID chip and a PIN code

D.

An alphanumeric, case-sensitive password with symbols

When a user plugs a USB drive into a workstation and attempts to transfer a file from the server, an error appears that indicates the file cannot be copied. However, the user can copy or create new files from the local workstation. Which of the following is part of this security strategy?

A.

HIDS

B.

SIEM

C.

ACL

D.

DLP

A technician is installing an OS on ten servers. Which of the following media installation types would allow for the fastest installation time?

A.

Network

B.

Embedded

C.

Optical

D.

USB

A server administrator is tasked with ensuring that information stored on company database systems is secure from bad actors. Which of the following security practices would accomplish this task?

A.

Encryption at rest

B.

Audit logging

C.

BIOS password

D.

Signal blocking

A technician needs to replace two RAID controllers on a database server as part of an upgrade. The server has six external storage arrays and eight internal disks that are controlled by the two RAID controllers. The technician completes the replacement and powers the systems back on, but the server OS detects several missing disks in the configuration. Which of the following steps should the technician take first to resolve this issue?

A.

Reboot to the RAID controller BIOS and rescan for attached disks and arrays

B.

Start the motherboard UEFI and confirm the RAID controller start order is correct

C.

Turn off the external arrays and reboot the server to redetect the internal disks first

D.

Turn off all components and confirm all external and internal cables before rebooting

A startup company needs to set up an initial disaster recovery site. The site must be cost-effective and deployed quickly. Which of the following sites should the company set up?

A.

Hot

B.

Cold

C.

Colocated

D.

Warm

The internal IT department policy for monitoring server health requires that evidence of server reboots be collected and reviewed on a regular basis. Which of the following should be monitored to best provide this evidence?

A.

Uptime

B.

IOPS

C.

CPU utilization

D.

Event logs

While a technician is troubleshooting a performance issue on a database server, users are disconnected from the database. An administrator is asked to intervene and restore access. Which of the following steps should the administrator take first?

A.

Revert any patches or updates on the server from the past 24 hours

B.

Reproduce the issue in a test environment and confirm the database fails in the same manner

C.

Perform a root cause analysis and report the issue to management

D.

Collect all logs from the system and review the actions the technician performed

E.

Perform a quick backup of the system to prevent any further issues

Page: 3 / 8
Total 493 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved