Topic 2: Exam Set B
A technician installed a kernel upgrade to a Linux server. The server now crashes regularly. Which of the following is the most likely cause?
A. Necessary dependencies were installed for multiple architectures.
B. There is not enough hard drive space.
C. The server is infected with a virus.
D. Some modules are not compatible.
Explanation:
The Linux kernel is the core of the operating system. Kernel Modules (like device drivers for network cards, storage controllers, or filesystems) are dynamically loaded into the kernel at runtime.
A kernel upgrade often involves changes to the kernel's internal Application Programming Interface (API).
If the existing modules were not recompiled, updated, or replaced with versions specifically built for the new kernel version, attempting to load or use these incompatible modules will inevitably lead to instability, system hangs, or the most severe failure: a kernel panic (a complete system crash).
Since the crashes started immediately after the kernel upgrade, this direct cause-and-effect relationship makes incompatible modules the most likely technical explanation.
Incorrect Options
A. Necessary dependencies were installed for multiple architectures.
Why it's Incorrect:
While installing unnecessary packages (even for different architectures) can consume disk space, it is a package management issue and would not typically cause the running kernel itself to crash repeatedly. If the wrong architecture kernel were installed, the system would likely fail to boot at all, not crash regularly.
There is not enough hard drive space.
Why it's Incorrect:
Lack of disk space can prevent processes from starting, logging from functioning, or the installation from completing in the first place. However, if the server successfully booted into the new kernel, lack of hard drive space is very rarely the root cause of frequent, total server crashes (kernel panics), which are generally memory, module, or CPU-related issues.
The server is infected with a virus.
Why it's Incorrect:
A virus or rootkit could definitely cause instability, but the question establishes a clear timeline: upgrade $\rightarrow$ crashes. In a troubleshooting scenario, the change that occurred (the upgrade) is the primary suspect. Attributing the issue to a coincidental virus infection, while possible, is less likely than a direct technical fault resulting from the upgrade process itself.
Summary
The most likely cause of a server crashing immediately after a kernel upgrade is incompatible kernel modules (D). This is a classic dependency and compatibility problem: when the central component (the kernel) changes, its dependent components (the modules/drivers) must be updated to match, or system stability will be compromised, leading to crashes or kernel panics. The immediate cause-and-effect relationship points directly to a technical incompatibility introduced by the change.
An administrator discovers a misconfiguration that impacts all servers but can be easily corrected. The administrator has a list of affected servers and a script to correct the issue. Which of the following scripting principles should the administrator use to cycle through the list of servers to deliver the needed change?
A. Linked list
B. String
C. Loop
D. Constant
Explanation
The core of this problem is automation and efficiency. The administrator needs to perform the exact same action (running the correction script) on a large number of items (the list of servers).
Doing this manually for each server would be time-consuming and prone to error.
The correct scripting principle to solve this is a Loop.
Why a Loop is the Best Choice:
A loop is a programming construct designed specifically to repeat a block of code multiple times. In this scenario, the administrator would write a loop that automatically iterates through each entry in the list of servers. For every server name the loop processes, it would execute the correction script. The computer handles the repetition, ensuring the change is delivered consistently and efficiently to every server without any manual intervention after the script is launched.
A Simple Analogy:
Imagine you have a class roster with 30 student names and you need to write each name on a certificate. A loop is like handing the roster and a stack of certificates to a robotic assistant. You instruct the robot once: "For each name on this list, write it on a certificate." The robot then cycles through the list automatically, performing the task 30 times. You don't have to point to each name and give the command 30 separate times.
Why the Other Options Are Incorrect
A. Linked List:
A linked list is a specific data structure used to store a collection of items. The question is about the action of processing the list (cycling through it), not about how the list itself is built or stored in memory. Whether the list is a linked list, an array, or a simple text file, you still need a loop to go through it.
B. String:
A string is a data type that represents text (e.g., a server name like "web-srv-01"). While the individual items within the list are likely strings, the concept of "cycling through the list" is not about the data type of the items. A string doesn't provide the mechanism for repetition.
D. Constant:
A constant is a fixed value that does not change while the script is running (e.g., defining MAX_USERS = 100). It is the opposite of what is needed here; a list of servers is a collection of changing items (each server name is different), and a constant cannot represent that. It has no relation to the process of iteration.
In summary,
the administrator needs a Loop to automatically and repeatedly apply the script to every server in the list, which is the fundamental purpose of a loop in scripting and automation.
A server administrator is instating a new server in a data center. The administrator connects the server to a midplane but does not connect any cables Which of the following types of servers is the administrator MOST likely installing?
A. Rack
B. Virtual
C. Tower
D. Blade
Explanation
A blade server is a modular server form factor designed to slide into a blade enclosure that contains:
Midplane/backplane connections
Shared networking, power, and cooling
Shared management controller (e.g., iDRAC, iLO modules)
Shared fabric interconnects, SAN connectivity, etc.
In a blade server environment:
The server itself does not require direct cable connections.
Instead, it receives all connectivity (data, power, network, storage) through the midplane.
The administrator inserting the server into a midplane without cabling strongly indicates a blade chassis deployment environment.
This matches CompTIA Server+ SK0-005 Objectives:
1.1 – Server form factors and characteristics
3.2 – Install hardware using required procedures
Incorrect Options — Why They Don’t Fit
A. Rack
Rack servers slide into racks and require direct cabling, including:
Power
Ethernet
Storage (SAS/HBA)
KVM/management ports
They do not use a midplane like blade systems.
B. Virtual
A virtual server:
Does not have physical hardware connections
Runs on a hypervisor
Is never “inserted into a midplane”
So this scenario cannot describe virtualization.
C. Tower
Tower servers resemble desktop PCs:
Larger chassis
Standalone power and cooling
Must be cabled for all connectivity
A tower server does not integrate with a midplane or enclosure.
Summary
Only blade servers are designed to be inserted into a blade enclosure where a midplane/backplane handles all connectivity — no direct cabling required during installation.
Therefore, the administrator is most likely installing a Blade server.
A technician learns users are unable to tog in to a Linux server with known-working LDAP credentials. The technician logs in to the server with a local account and confirms the system is functional can communicate over the network, and is configured correctly However, the server log has entries regarding Kerberos errors. Which of the following is the MOST likely source of the issue?
A. A local firewall is blocking authentication requests.
B. The users have expired passwords
C. The system clock is off by more than five minutes
D. The server has no access to the LDAP host
Explanation:
This problem centers on why working LDAP credentials are failing, with a key clue found in the logs: Kerberos errors.
Why the Clock Causes Kerberos Failures:
Kerberos and Time Synchronization:
Kerberos is a secure network authentication protocol that is highly time-sensitive. To prevent "replay attacks" where an attacker intercepts and reuses authentication tickets, Kerberos uses timestamps.
The Five-Minute Rule:
A common default tolerance in Kerberos configurations is a five-minute window. If the client's (the Linux server in this case) clock is out of sync with the Key Distribution Center (KDC—the central Kerberos server, which is often part of the same domain controller handling LDAP) by more than this limit, authentication requests are rejected as a security measure.
The Scenario Flow:
A user tries to log in. The server uses Kerberos to authenticate against the domain controller.
The server's clock is significantly skewed (e.g., 10 minutes slow).
The timestamp it sends with the authentication request is outside the acceptable window compared to the domain controller's clock.
The domain controller rejects the request, and the user sees a login failure, even though their password is correct.
The technician confirmed the server is otherwise healthy (network functional, configuration correct), which makes a subtle issue like clock skew the most probable culprit.
Why the Other Options Are Less Likely:
A. A local firewall is blocking authentication requests:
This was indirectly ruled out. The technician confirmed the server "can communicate over the network." Since LDAP and Kerberos authentication require active communication with a domain controller, successful network tests make a blocking firewall a less likely cause.
B. The users have expired passwords:
This is incorrect because the problem states the credentials are "known-working." If passwords had expired, they would, by definition, no longer be working. Furthermore, a password expiration would typically generate a different error message (e.g., "password expired") rather than a Kerberos-specific error.
D. The server has no access to the LDAP host:
This was directly ruled out by the technician who confirmed the server "can communicate over the network" and is "configured correctly," which includes having the correct LDAP host information. A complete lack of network access to the LDAP/Kerberos host would cause a different type of connection failure, not specifically Kerberos errors.
Conclusion:
The combination of functional LDAP credentials, a working network, and specific Kerberos errors in the log points overwhelmingly to a time synchronization issue. The system clock being off by more than five minutes is a classic and common cause of this exact failure mode.
Reference:
This is a well-documented principle of the Kerberos authentication protocol. For official confirmation, you can refer to the CompTIA Server+ (SK0-005) Exam Objectives under domain 4.0 "Security," which covers authentication methods and their common issues. The time-sensitivity of Kerberos is a fundamental aspect of its security design.
A server administrator encounters some issues with the server OS after applying monthly patches. Which of the following troubleshooting steps should the administrator perform?
A. Implement rollback procedures.
B. Upgrade the drivers.
C. Reinstall the OS.
D. Reboot the server.
Explanation
When issues arise directly after applying OS patches, the highest-priority troubleshooting step is to roll back the updates to restore the previous known-good state.
Reasons rollback is the correct action:
Patch failures are a common root cause of post-update instability
Rollback restores system functionality, stability, and compatibility
Troubleshooting frameworks (ITIL/CompTIA) recommend reverting changes when:
A recent update directly correlates to the issue
System availability is impacted
Helps minimize downtime in production server environments
Prevents unnecessary additional configuration changes
Rollback options may include:
Uninstalling the OS updates
Restoring from backup/snapshot
Using vendor-provided rollback tools
Incorrect Options
B. Upgrade the drivers
Driver updates are unrelated to OS patch rollback
May introduce additional compatibility issues
Should only be done after confirming a driver is the root cause
Not a first action.
C. Reinstall the OS
This is a last resort solution
Causes downtime and requires full configuration + data restoration
Overkill when a simple patch rollback can fix the system
Too disruptive and unnecessary initially.
D. Reboot the server
A reboot may temporarily clear issues but:
Does not remove faulty patches
Does not address root cause
Always allowed in maintenance windows but not a true rollback step
Might be part of the process, but isn’t the correct troubleshooting action for patch-related OS failures.
Summary
If the OS becomes unstable immediately following patches…
Roll back the update to return the system to a functional state
A server administrator just installed a new physical server and needs to harden the OS.
Which of the following best describes the OS hardening method?
A. Apply security updates.
B. Disable unneeded hardware.
C. Set a BIOS password.
D. Configure the boot order.
Explanation
The process of OS Hardening (or System Hardening) involves reducing the security risk by decreasing the attack surface of the system. This is achieved by removing or disabling anything that isn't absolutely required for the server's specific role.
Correct Option (B)
B. Disable unneeded hardware (and associated services/software).
Reasoning:
This aligns with the fundamental principle of hardening: "Remove what you don't need." Disabling unneeded hardware (like a CD-ROM, USB ports, or even unused network interfaces) reduces the system's attack surface because it eliminates potential entry points for an attacker. More importantly, this includes disabling unnecessary services and daemons that run to support such hardware or features (e.g., telnet, FTP, unnecessary web services), which is a crucial and expansive part of OS hardening.
Incorrect Options
A. Apply security updates.
Why it's Incorrect:
Applying updates is a critical, ongoing maintenance task to keep the system secure, but it is typically viewed as a patch management component of security rather than the defining method of hardening. Hardening focuses on initial secure configuration and reducing the attack surface by turning things off.
C. Set a BIOS password.
Why it's Incorrect:
Setting a BIOS/UEFI password is a form of physical security for the server hardware itself, preventing unauthorized changes to the firmware settings or boot order. While important for overall server security, it is a hardware hardening step, not a primary Operating System (OS) hardening method.
D. Configure the boot order.
Why it's Incorrect:
Configuring the boot order (e.g., to boot only from the hard drive, not USB or CD-ROM) is another form of physical and hardware security. It prevents an attacker with physical access from booting a malicious external OS to bypass the local security controls, but it is not a direct measure to harden the running operating system configuration.
Summary
OS hardening is primarily about reducing the system's attack surface. The best way to describe this method among the options is to disable unneeded components (B), which encompasses removing unnecessary software, shutting down non-essential services, and disabling unused hardware. This minimizes potential vulnerabilities that could be exploited.
A human resources analyst is attempting to email the records for new employees to an outside payroll company. Each time the analyst sends an email containing employee records, the email is rejected with an error message. Other emails outside the company are sent correctly. Which of the following is MOST likely generating the error?
A. DHCP configuration
B. Firewall rules
C. DLP software
D. Intrusion detection system
Explanation:
The scenario describes a very specific failure:
emails are rejected only when they contain sensitive employee records, while all other external emails work perfectly. This pattern points directly to a security control that inspects email content.
Why DLP is the Most Likely Cause:
What DLP Is:
Data Loss Prevention (DLP) software is specifically designed to monitor, detect, and block sensitive data from leaving a corporate network. It scans the content of outbound emails for predefined patterns like Social Security numbers, credit card numbers, or confidential HR records.
How It Applies Here:
The human resources analyst is attempting to send employee records to an outside company. The DLP system has likely identified these records as highly sensitive internal data. Based on its security policies, it is blocking the transmission to prevent potential data loss or a compliance violation, generating the rejection error.
The Key Clue:
The problem is content-specific. Since the error only occurs when the attachment contains employee records and not with other emails, the issue is clearly tied to the data itself, not the network connection or general email functionality.
Why the Other Options Are Less Likely:
A. DHCP configuration:
DHCP is responsible for automatically assigning IP addresses to devices on a network. A misconfiguration would cause a general failure to connect to the network or the internet, not a selective failure to send emails with specific attachments.
B. Firewall rules:
While a firewall could be configured to block emails to specific domains, the problem states that "other emails outside the company are sent correctly." This means the general pathway for outbound email (SMTP) is open. A firewall typically operates at the network/port level and is less likely to inspect and filter based on the specific content of an email attachment.
D. Intrusion detection system (IDS):
An IDS is a monitoring system designed to detect and alert on suspicious network activity or attack patterns. It is generally a passive system that logs and alerts but does not actively block or reject traffic. A system that actively blocks traffic is an Intrusion Prevention System (IPS). Even an IPS is less likely than DLP to target outbound emails containing sensitive HR data, as that is the primary function of DLP.
Conclusion:
The precise, content-based nature of the email rejection is the hallmark of a DLP system enforcing data security policy. It is the only technology listed that is specifically designed to identify and block the transmission of sensitive internal data like employee records.
Reference:
This aligns with the security objectives of the CompTIA Server+ (SK0-005) certification, particularly in domains covering data security and protecting sensitive information. DLP is a standard control for preventing unauthorized data exfiltration.
Which of the following licensing models is MOST appropriate tor a data center that has a variable daily equipment count?
A. Pet site
B. Per server
C. Per user
D. Per core
Explanation
A data center with variable daily equipment count needs a licensing model that:
Scales dynamically with the number of servers in operation
Avoids paying for unused licenses when equipment is offline
Allows flexibility for provisioning and decommissioning servers
Per server licensing matches this scenario because:
Licenses are applied per physical or virtual server.
If servers are added or removed on a daily basis, licensing costs can be adjusted accordingly.
Ensures compliance while keeping costs aligned with actual usage.
Example:
If the data center provisions 10 servers one day and 15 the next, only those active servers need licenses.
Other models (per user, per core) do not scale as easily with variable server counts.
Reference:
2.3 – Given a scenario, implement server licensing models
Incorrect Options
A. Per site
Per site (or per location) licensing charges a flat fee for the entire site, regardless of server count.
While simple, it’s not cost-efficient for a site where daily equipment counts vary.
Could result in overpaying when fewer servers are active.
C. Per user
Licensing is tied to individual users accessing the system.
Useful for software like Microsoft Office or SaaS platforms.
Not suitable for variable server equipment, as the issue here concerns hardware provisioning, not user access.
D. Per core
Licensing is tied to the number of CPU cores in a server.
Works well for performance-based or high-density servers.
Does not address variable daily server count, only CPU configuration.
Summary
For a data center with frequent changes in server count, the most flexible and cost-effective model is:
Per server licensing — only active servers require licenses, scaling naturally with hardware changes.
Which of the following concepts refers to prioritizing a connection that had previously worked successfully?
A. Round robin
B. SCP
C. MRU
D. Link aggregation
Explanation
The concept that refers to prioritizing a connection that had previously worked successfully is Most Recently Used (MRU) when applied in the context of connection management, though the term also has a more common definition in networking.
Correct Option (C): MRU (Most Recently Used)
In Connection Management (The Context of the Question):
In certain network connection protocols (historically Point-to-Point Protocol or PPP, or in load balancing/failover scenarios), MRU can refer to a configuration or algorithm that attempts to re-establish a connection with the last successfully used peer/configuration first. This is a prioritization mechanism that favors historical success for efficiency or reliability.
Common Networking Definition (Primary Context):
However, the more standard and widespread definition of MRU in networking is Maximum Receive Unit, which refers to the largest size of a data packet a network interface can receive without fragmentation. Given the nature of the other options, the question is likely testing a less common, administrative/protocol definition related to connection preference.
Incorrect Options
A. Round robin:
Why it's Incorrect:
Round robin is a load balancing algorithm that distributes connections sequentially to the available servers in a list.
It treats all connections equally and does not prioritize based on previous success or connection history.
B. SCP (Secure Copy Protocol):
Why it's Incorrect:
SCP is a protocol used for secure file transfer over an SSH connection.
It is not a connection prioritization or load balancing concept.
D. Link aggregation:
Why it's Incorrect:
Link aggregation (also known as trunking or bonding) is a technique used to bundle multiple physical network links into a single logical link to increase bandwidth and provide redundancy.
It deals with combining capacity, not prioritizing a specific path based on past connection success.
Summary
The term that best describes a concept prioritizing a previously successful connection is MRU (Most Recently Used), which, in some networking contexts, is an algorithm that favors the last working configuration or path for connection attempts.
A server administrator is implementing an authentication policy that will require users to use a token during login. Which of the following types of authentication is the administrator implementing?
A. Something you are
B. Something you know
C. Something you have
D. Something you do
Explanation:
This question is about the fundamental categories of authentication factors. An authentication token is a physical object that generates a temporary, one-time code used during the login process.
Why "Something you have" is Correct:
A token is a physical device that a user possesses. It falls squarely into the "Something you have" category of authentication because:
It is a tangible object you carry with you (like a key fob, a smart card, or a software token on your phone).
Its function is to prove your identity by demonstrating you are in possession of a specific, registered item.
This creates multi-factor authentication (MFA) when combined with another category, such as a password ("something you know").
Why the Other Options Are Incorrect:
A. Something you are:
This category refers to biometrics. It uses your unique physical characteristics for authentication, such as a fingerprint scan, facial recognition, or an iris scan. A token is an object you hold, not a part of your body.
B. Something you know:
This category is for secret information memorized by the user.
The most common example is a password or a PIN.
A token is not a piece of knowledge; it is a physical item.
D. Something you do:
This is a less common category that involves a unique action you perform, such as a specific gesture or a pattern of keystrokes.
A token does not involve an action in this sense; it is about possession of the device itself.
Conclusion:
By requiring a token, the administrator is adding a "Something you have" factor to the login process, significantly increasing security beyond just a username and password.
Reference:
This is a core information security concept. You can find it in the official CompTIA Server+ (SK0-005) Exam Objectives under domain 4.0 "Security," which covers access control and multifactor authentication methods. The three common factor types are explicitly defined as "something you know, something you have, and something you are."
| Page 17 out of 50 Pages |
| SK0-005 Practice Test | Previous |