00:20:00

CompTIA Server+ Practice Test (SK0-005)

Use the form below to configure your CompTIA Server+ Practice Test (SK0-005). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Server+ SK0-005
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Server+ SK0-005 Information

The CompTIA Server+ (SK0‑005) certification is tailored for IT professionals aiming to validate their proficiency in installing, managing, securing, and troubleshooting server systems across data center, on‑premises, and hybrid environments. Launched in May 2021, this mid‑level exam comprises up to 90 multiple‑choice and performance‑based questions, to be completed in 90 minutes, and requires a passing score of 750 on a 100–900 scale. Candidates are expected to have approximately two years of hands‑on experience in server environments and should possess foundational knowledge equivalent to CompTIA A+ certification.

The exam covers four core domains: Server Hardware Installation and Management (18%), Server Administration (30%), Security and Disaster Recovery (24%), and Troubleshooting (28%).

The hardware domain includes tasks like racking servers, managing power and network cabling, configuring RAID, and maintaining various drive types, from SSDs to hybrid systems.

The administration domain focuses on OS installation (GUI, core, virtualized, or scripted), network configuration, server roles and virtualization, scripting basics, asset documentation, backup of configurations, and licensing concepts .

Security and disaster recovery encompass server hardening techniques, physical and data security, identity and access management, backup strategies (full, incremental, snapshot), and recovery planning including hot, warm, cold, and cloud-based site setup .

The troubleshooting domain emphasizes systematic problem-solving across hardware, storage, OS and software, network connectivity, and security issues, involving techniques such as diagnostics, log analysis, reseating components, and resolving boot errors or DHCP/DNS issues .

Aspiring candidates should follow a structured preparation plan using official exam objectives to guide their study. Practical experience and familiarity with real-world scenarios—especially using hands-on labs, performance-based exercises, scripting tasks, RAID configuration, virtualization, and disaster recovery setups—can significantly enhance readiness. This targeted strategy helps ensure both technical competence and confidence when tackling the SK0-005 Server+ exam.

CompTIA Server+ SK0-005 Logo
  • Free CompTIA Server+ SK0-005 Practice Test

  • 20 Questions
  • Unlimited
  • Server Hardware Installation and Management
    Server Administration
    Security and Disaster Recovery
    Troubleshooting
Question 1 of 20

A server administrator executes the following PowerShell command:

$serviceState = (Get-Service -Name "wuauserv").Status

Which statement BEST describes the function of $serviceState in this context?

  • It is an array that will hold all properties of the wuauserv service object.

  • It is a command alias used to restart the wuauserv service.

  • It is an environment variable that sets the display name for the service.

  • It is a variable that will store the value of the Status property from the service object.

Question 2 of 20

A data center technician is tasked with connecting a new server's Host Bus Adapter (HBA) to an existing storage area network (SAN) switch. The technician observes that the available ports on the switch require a fiber optic connector with a distinct square profile and a push-pull mating mechanism. Which connector type must the patch cable have to ensure a successful connection?

  • MPO

  • LC

  • ST

  • SC

Question 3 of 20

A server administrator is tasked with implementing a new data protection plan for several systems but has a limited budget for high-end security controls like advanced encryption and real-time replication. To ensure the most critical assets are protected first, the administrator performs a business impact analysis. Which of the following systems should be prioritized for the highest level of security controls?

  • A server hosting the customer relationship management (CRM) database containing personally identifiable information (PII).

  • A development server used by the in-house programming team for testing new application features.

  • A public-facing web server that hosts the company's static marketing website.

  • An internal file server containing marketing materials and departmental documents.

Question 4 of 20

Your organization operates a headless Fedora Server that functions as a KVM hypervisor. The CI/CD pipeline must invoke shell commands over SSH to start, stop, and query virtual machines on that host; no graphical desktop environment is installed. Which built-in management interface is the best choice for this requirement?

  • VMware ESXi Direct Console User Interface (DCUI)

  • virt-manager graphical Virtual Machine Manager

  • virsh command-line utility provided by libvirt

  • Hyper-V Manager Microsoft Management Console snap-in

Question 5 of 20

While cleaning up a PowerShell provisioning script, a junior administrator tried to disable a five-line section by wrapping it like this:

<#
    Set-ExecutionPolicy RemoteSigned
    Restart-Service WinRM
*/

The script immediately fails with a tokenization error. Which delimiter should replace the closing "*/" so that the block is parsed as a valid PowerShell comment?

  • --

  • //

  • */

  • #>

Question 6 of 20

A systems administrator receives multiple alerts for a production database server. Automated database backups have been failing for the last 12 hours. The database application service is also failing to restart after unexpected crashes. When the administrator attempts to open the application's primary log file to investigate, the operation fails with an error indicating the action cannot be completed. Which of the following is the MOST likely cause of these combined issues?

  • The server's data volume has insufficient disk space.

  • A recent OS patch has created a driver incompatibility.

  • The database server has a memory leak.

  • The RAID controller's cache battery has failed.

Question 7 of 20

While adding a new A record to the BIND zone file for the internal finance.example.com DNS zone, you notice the file begins with the directive

$ORIGIN finance.example.com.

Any record name that does not end with a dot will have that origin automatically appended. The application team has asked you to enter the server name as a fully qualified domain name (FQDN) that is absolute so the origin will not be appended again. Which record name meets this requirement?

  • app05.finance.example.com.

  • app05

  • app05.finance.example.com

  • app05.finance

Question 8 of 20

A Windows Server 2019 VM in the production cluster has begun blue-screening overnight. For security reasons you are not allowed to open an RDP session to the server, but the machine is online and reporting to Microsoft System Center Configuration Manager (SCCM). You need to grab the server's CCM log files (such as WUAHandler.log and ScanAgent.log) so you can review them on the site server without logging on to the VM. Which SCCM client-notification action should you trigger from the Configuration Manager console to accomplish this task?

  • Collect Client Logs

  • Download computer policy

  • Evaluate software update deployments

  • Enable verbose logging

Question 9 of 20

A manufacturing firm has documented a recovery point objective (RPO) of 2 hours for its network-attached CAD file share.
The data-protection plan currently:

  • takes a differential snapshot at 00:00 and 12:00, and
  • replicates changed blocks to an off-site array every 30 minutes (at :00 and :30 past the hour).

On Tuesday the primary volume fails at 14:15.

Which statement BEST describes whether the documented RPO was achieved?

  • The RPO was NOT satisfied because the two-hour target refers to restoration time, and failover will exceed it.

  • The RPO was satisfied because the last 14:00 replication limits potential data loss to about 15 minutes.

  • The RPO was satisfied because the 12:00 differential snapshot is within two hours.

  • The RPO was NOT satisfied because the most recent usable copy is the 12:00 snapshot, resulting in over two hours of lost data.

Question 10 of 20

A systems administrator is hardening a new payroll system that houses credit-card data. She enables Transparent Data Encryption (TDE) on the SQL Server 2022 database files and establishes a site-to-site VPN that uses IPsec ESP to encrypt the nightly replication traffic between headquarters and the disaster-recovery site. According to the company's policy, encryption controls must align with the correct paradigm. Which statement correctly maps each control to its encryption paradigm?

  • TDE protects data in transit, and IPsec protects data at rest.

  • Both TDE and IPsec protect data at rest only.

  • Both TDE and IPsec protect data in transit only.

  • TDE protects data at rest, and IPsec protects data in transit.

Question 11 of 20

A software vendor plans to ship a small license file with each on-premises installation of its application. At start-up, the application must verify that the file has not been altered and must work even when the server is offline or isolated from the Internet or a central license server. Which licensing model most directly satisfies this tamper-resistant requirement?

  • Signature-based licensing that embeds a vendor-signed certificate in the license file

  • Concurrent (floating) licensing that checks out seats from a central license server

  • Per-core licensing that charges according to the number of CPU cores

  • Node-locked licensing tied to the system's hardware fingerprint

Question 12 of 20

A server that hosts a write-intensive SQL database uses eight 10 K RPM SAS disks on a hardware RAID controller with 1 GB of battery-backed cache. According to the build book, the volume should deliver the highest possible write throughput while still surviving the loss of one disk in each mirrored pair. After a recent controller replacement and array rebuild, administrators notice that large batch inserts now take three times longer and the controller dashboard shows constant parity-calculation activity. The logical drive is currently defined as RAID 50 with a 256 KB stripe size. Which change would BEST correct the improper RAID configuration and restore the expected write performance without sacrificing fault tolerance?

  • Recreate the logical drive as RAID 10 across all eight disks.

  • Convert the array to RAID 6 and add a global hot spare.

  • Enable read-ahead caching on the controller and retain the current RAID 50 layout.

  • Keep RAID 50 but reduce the stripe size from 256 KB to 32 KB.

Question 13 of 20

A systems administrator is provisioning a new virtual machine (VM) that will function as a production database server. A key requirement is that the VM must be accessible on the corporate LAN using an IP address from the same subnet as the physical servers, allowing other devices to communicate with it directly. Which virtual networking mode should the administrator configure for the VM's network adapter to meet this requirement?

  • Host-only

  • Bridged

  • Private

  • NAT

Question 14 of 20

During a hardware refresh, a company retires a 1 U rack-mount server that previously stored sensitive PCI-DSS data. Management decides to repurpose the unit for an isolated QA lab instead of sending it to an electronics recycler. According to accepted decommissioning and recycling best practices, which step must be completed before the server is connected to the lab network?

  • Perform a NIST SP 800-88-compliant wipe of all installed drives (or replace the drives entirely) to remove residual data.

  • Remove any production VLAN assignments from the switch port that will serve the repurposed server.

  • Retag the chassis with a new asset number and update the configuration-management database.

  • Replace the dual 750 W power supplies with lower-wattage units to reduce energy consumption in the lab.

Question 15 of 20

A systems administrator at a financial institution is decommissioning a server that stored sensitive customer data on several magnetic hard disk drives (HDDs). The company's security policy mandates that the storage media be physically destroyed in a way that reduces them to fragments, ensuring the platters cannot be reassembled or forensically analyzed. Which of the following methods best meets this specific requirement?

  • Drilling

  • Shredding

  • Degaussing

  • Wiping

Question 16 of 20

An administrator is tasked with deploying dozens of new virtual servers in the cloud. Each server, upon its first boot, must automatically install a baseline set of applications, configure network settings, apply security hardening policies, and enroll in the company's device management system. Which of the following terms BEST describes the script or process used to perform this initial automated configuration?

  • Bootstrap script

  • Scheduled task

  • Failover script

  • Login script

Question 17 of 20

A Windows Server 2022 administrator is creating a PowerShell script that will

  1. stop a custom service,
  2. apply a security patch,
  3. restart the same service.

The script must run automatically every time the server is shut down for scheduled maintenance and must execute with Local System privileges without requiring any ongoing user interaction. Which implementation method best meets these requirements with the least administrative overhead?

  • Add the script path to the PowerShell $Profile of the built-in Administrator account so it executes whenever that user starts a shell.

  • Copy a shortcut to the script into C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup so it launches during startup and shutdown.

  • Create a Scheduled Task that triggers on User Logoff and runs the script with the highest privileges.

  • Assign the script as a computer Shutdown script in Local (Group) Policy under Computer Configuration > Windows Settings > Scripts (Startup/Shutdown).

Question 18 of 20

While maintaining Windows Server startup scripts written in VBScript, you discover that a typo in a variable name let the script run with an unintended Variant variable instead of failing. Which single-line directive should you place at the very top of each .vbs file so the script engine forces explicit variable declarations and stops when an undeclared name is used?

  • Option Strict

  • Use Strict Variable

  • Option Explicit

  • Dim All

Question 19 of 20

A systems administrator is troubleshooting a production server that is exhibiting unusually high network traffic and CPU utilization. However, when the administrator runs standard command-line tools like netstat and top, the reported processes and connections do not account for the resource usage. An anti-malware scan of the running operating system completes without detecting any threats. Which of the following types of malware is MOST likely causing these symptoms?

  • Polymorphic virus

  • Ransomware

  • Adware

  • Rootkit

Question 20 of 20

A datacenter team performs a full backup to LTO-9 tape every night.

  • Monday-Thursday tapes are overwritten the next week.
  • Each Friday tape is kept for five weeks before reuse.
  • The last Friday tape of each month is archived for 12 months, and the December copy is stored permanently off-site.
    Which tape-media rotation methodology does this schedule implement?
  • Tower of Hanoi rotation

  • Grandfather-Father-Son rotation

  • Reverse incremental rotation

  • First-in/first-out rotation