🔥 40% Off Crucial Exams Memberships — This Week Only

2 days, 13 hours remaining!
00:20:00

CompTIA Server+ Practice Test (SK0-005)

Use the form below to configure your CompTIA Server+ Practice Test (SK0-005). The practice test can be configured to only include certain exam objectives and domains. You can choose between 5-100 questions and set a time limit.

Logo for CompTIA Server+ SK0-005
Questions
Number of questions in the practice test
Free users are limited to 20 questions, upgrade to unlimited
Seconds Per Question
Determines how long you have to finish the practice test
Exam Objectives
Which exam objectives should be included in the practice test

CompTIA Server+ SK0-005 Information

The CompTIA Server+ (SK0‑005) certification is tailored for IT professionals aiming to validate their proficiency in installing, managing, securing, and troubleshooting server systems across data center, on‑premises, and hybrid environments. Launched in May 2021, this mid‑level exam comprises up to 90 multiple‑choice and performance‑based questions, to be completed in 90 minutes, and requires a passing score of 750 on a 100–900 scale. Candidates are expected to have approximately two years of hands‑on experience in server environments and should possess foundational knowledge equivalent to CompTIA A+ certification.

The exam covers four core domains: Server Hardware Installation and Management (18%), Server Administration (30%), Security and Disaster Recovery (24%), and Troubleshooting (28%).

The hardware domain includes tasks like racking servers, managing power and network cabling, configuring RAID, and maintaining various drive types, from SSDs to hybrid systems.

The administration domain focuses on OS installation (GUI, core, virtualized, or scripted), network configuration, server roles and virtualization, scripting basics, asset documentation, backup of configurations, and licensing concepts.

Security and disaster recovery encompass server hardening techniques, physical and data security, identity and access management, backup strategies (full, incremental, snapshot), and recovery planning including hot, warm, cold, and cloud-based site setup.

The troubleshooting domain emphasizes systematic problem-solving across hardware, storage, OS and software, network connectivity, and security issues, involving techniques such as diagnostics, log analysis, reseating components, and resolving boot errors or DHCP/DNS issues.

Aspiring candidates should follow a structured preparation plan using official exam objectives to guide their study. Practical experience and familiarity with real-world scenarios, especially using hands-on labs, performance-based exercises, scripting tasks, RAID configuration, virtualization, and disaster recovery setups, can significantly enhance readiness. This targeted strategy helps ensure both technical competence and confidence when tackling the SK0-005 Server+ exam.

CompTIA Server+ SK0-005 Logo
  • Free CompTIA Server+ SK0-005 Practice Test

  • 20 Questions
  • Unlimited time
  • Server Hardware Installation and Management
    Server Administration
    Security and Disaster Recovery
    Troubleshooting
Question 1 of 20

A systems administrator is tasked with hardening a new file server to mitigate the risk of data theft from a physical breach of the data center. A primary security requirement is that all data stored on the server's drives must be unreadable if the physical drives are removed from the server. The encryption method should be transparent to the operating system and applications once the system is booted. Which of the following solutions BEST meets this requirement?

  • Full Disk Encryption (FDE)

  • Database encryption

  • Transport Layer Security (TLS)

  • File-level encryption

Question 2 of 20

A systems administrator is reviewing the EULA for a new analytics engine that will run on a pair of rack-mount servers, each equipped with two 20-core CPUs that have Hyper-Threading enabled (40 logical processors per socket). The vendor's terms state that one license is required for every physical CPU core that is enabled in firmware, and that simultaneous multithreading does not increase the license count. No additional CALs are necessary, regardless of how many users connect to the service.

Which licensing model is the software vendor using?

  • Per-socket

  • Per-concurrent user

  • Per-server

  • Per-core

Question 3 of 20

Your organization's file server uses a hardware RAID-5 array with HPE SmartDrives. While performing routine rounds in the data center you notice that the drive-status LED on bay 3 is blinking amber and the activity ring is flashing irregularly green. The iLO management log simultaneously records the message "Predictive Failure: Port 3I Box 1 Bay 3." All virtual disks remain online and writable.

Based on the fault and device indications, which response best follows vendor recommendations to protect data availability?

  • Move the suspect drive to another bay and force the controller to rebuild it.

  • Perform an immediate hot-swap of the disk in bay 3 with a compatible spare drive.

  • Clear the controller log and continue operating because the array is still fault-tolerant.

  • Disable the drive's fault LED in the RAID utility and replace the disk after a second failure.

Question 4 of 20

During a quarterly security assessment, an administrator reviewing several newly racked servers notices that each motherboard includes an 802.11ax/Bluetooth radio that shipped from the manufacturer enabled by default. The organization's data-center policy forbids any form of wireless communication on production hosts. Which action, performed during the next maintenance window, BEST satisfies the hardware-hardening requirement?

  • Install a host-based firewall and block all outbound HTTPS traffic.

  • Disable the onboard Wi-Fi/Bluetooth adapter in the server's UEFI/BIOS settings.

  • Replace the factory wireless antenna leads with shielded cables to absorb RF signals.

  • Enable 802.1X authentication on every wired Ethernet interface.

Question 5 of 20

You are scheduling a nightly Robocopy job to migrate a 2 TB departmental share from \FS01\Share to \FS02\Share. The migration must (1) delete any files or folders that were removed from the source, (2) preserve every NTFS permission, ownership entry, and audit record, (3) append status details to an existing log file at C:\Logs\ShareSync.log, and (4) speed up the transfer by using 16 copy threads. Which command will meet all of these requirements?

  • robocopy \FS01\Share \FS02\Share /E /COPYALL /MT:16 /LOG+:C:\Logs\ShareSync.log

  • robocopy \FS01\Share \FS02\Share /E /SEC /MT:16 /LOG:C:\Logs\ShareSync.log

  • robocopy \FS01\Share \FS02\Share /MIR /COPY:DATS /MT:8 /LOG+:C:\Logs\ShareSync.log

  • robocopy \FS01\Share \FS02\Share /MIR /COPYALL /MT:16 /LOG+:C:\Logs\ShareSync.log

Question 6 of 20

A systems administrator is configuring a new server that will host the company's primary authentication service. The service requires high availability, and the primary concern for the operating system volume is resilience against a single drive failure to ensure continuous operation. Storage capacity and write performance are secondary concerns for this volume. Which of the following RAID configurations should the administrator implement for the two dedicated OS drives?

  • RAID 0

  • RAID 5

  • JBOD

  • RAID 1

Question 7 of 20

A systems administrator is configuring a new rack-mounted hypervisor to connect to a block-level storage array over the existing Ethernet network. The goal is to present storage LUNs to the hypervisor, which will appear as local disks to the virtual machines. To achieve this, the administrator must configure a software component on the hypervisor to discover and log in to the storage array. What is the standard name for this software component in an iSCSI configuration?

  • Fibre Channel HBA

  • LUN masker

  • iSCSI initiator

  • iSCSI target

Question 8 of 20

A company operates its primary data center on the South Carolina coast, an area that is frequently in the path of Atlantic hurricanes. Management is reviewing four candidate facilities for a warm disaster-recovery site and has instructed the systems administrator that the location must satisfy the requirement for a separate geographic location so that a single regional event cannot disable both sites. Which proposed facility BEST meets this requirement?

  • A colocation cage 10 km inland that remains inside the coastal hurricane evacuation zone and uses the same regional power grid.

  • A tier-III facility 400 km inland in northern Georgia that is outside the coastal hurricane zone, on a different power grid, and connected through a separate long-haul telecom provider.

  • A second data-hall floor in the same building that houses the primary data center.

  • A leased data hall 50 km up the coast that shares the primary site's electrical grid but sits outside the immediate storm-surge floodplain.

Question 9 of 20

A company relies on a mission-critical database application licensed under a subscription model. The server administrator receives a notification that due to a budget shortfall, the annual subscription renewal, due next month, will not be paid. What is the MOST significant and immediate risk the company faces in this situation?

  • The company can continue using the current software version but will no longer receive security patches or support.

  • The company will lose the right to use the database application, leading to a service outage.

  • The vendor will initiate a mandatory and costly license compliance audit.

  • The software will automatically downgrade to a free, feature-limited version.

Question 10 of 20

A server administrator is performing a routine audit of network traffic logs for a file server. The administrator discovers that a large volume of data, several gigabytes in size, was transferred to an unknown external IP address overnight. The transfer occurred outside of the normal backup window and does not correspond to any scheduled maintenance tasks. Which of the following data security risks has the administrator most likely identified?

  • Insider threat

  • Data corruption

  • Hardware failure

  • Data breach

Question 11 of 20

Your organization's business-continuity plan specifies a recovery time objective of four days and a 24-hour recovery point objective for a non-critical archival records system. Senior management insists on the lowest possible recurring cost for the alternate facility. Only power, climate control, and network connectivity need to be in place ahead of time; the IT staff is prepared to ship in hardware and restore data from nightly backups after a disaster occurs. Which type of disaster-recovery site BEST meets these requirements?

  • Cold site that supplies only basic utilities and floor space

  • Active-active metropolitan cluster running live workloads in multiple datacenters

  • Fully equipped hot site synchronized with production systems

  • Partially provisioned warm site with pre-installed servers but inactive data

Question 12 of 20

A data-center administrator performs an initial full backup on Sunday and incremental backups Monday through Friday. To avoid re-scanning the 25 TB file share every weekend, the backup application runs a Saturday job that creates a new full backup image entirely on the backup repository by merging the last full backup with the week's incremental files; no data is read from the production server or traverses the network. Which backup method is the administrator using?

  • Reverse incremental backup

  • Synthetic full backup

  • Active full backup

  • Differential backup

Question 13 of 20

While onboarding a new virtualization host, a systems administrator bonds two 10 GbE interfaces with LACP and enables 802.1Q tagging so the server can carry multiple VLANs. The host's management interface on VLAN 10 is reachable from the network, but virtual machines on VLAN 30 can only talk to one another locally and cannot ping the gateway that resides on the access-layer switch. Other servers connected to the same distribution switches have full connectivity on VLAN 30. After verifying that the NIC team and the vSwitch on the host are tagging frames for both VLANs, which switch-side configuration error would most likely cause this symptom?

  • The port-channel connected to the host is set to access mode in VLAN 10 instead of a trunk that permits VLAN 30.

  • BPDU Guard is enabled on the switch interface, causing Spanning Tree to restrict VLAN 30 traffic.

  • LACP fast-timer negotiation is disabled on the switch, so the bundle reverts to individual links.

  • The router sub-interface for VLAN 30 is configured with a smaller MTU than the switch and server.

Question 14 of 20

A user in the finance department reports they can no longer open a critical quarterly report file stored on a Windows file server. The user was able to access this file yesterday without any issues. The server administrator confirms the user is a member of the correct Active Directory security group, and the NTFS and share permissions are configured correctly. The administrator also verifies the user can open other files in the same network folder.

While reviewing the server's security event logs, the administrator discovers a high-priority alert from the previous night related to the specific file. The alert states that the file's hash value changed unexpectedly and was flagged by the server's file integrity monitoring (FIM) system.

What is the MOST likely cause of the user being unable to open the file?

  • The user's domain account has been locked out due to multiple failed login attempts.

  • The file has become corrupted due to a bad sector on the storage volume.

  • A Data Loss Prevention (DLP) policy has quarantined the file due to a detected integrity violation.

  • The Workstation service on the user's local computer has stopped functioning.

Question 15 of 20

A server administrator is investigating a recent performance degradation issue on a critical file server. The investigation reveals that a former employee's account, which was not properly deprovisioned, was used to log in outside of business hours. System logs show that this account was used to access and delete several project directories before the user attempted to clear the security event logs. Which of the following security risks is most likely represented in this scenario?

  • Unintentional insider threat

  • Malicious insider threat

  • Backdoor

  • Social engineering

Question 16 of 20

During a data-center deployment you must write a Bash script that blocks further configuration steps until the HTTPS listener on the same host is accepting connections. The script will run nc -z localhost 443 every five seconds to test the port. Which basic loop construct lets the script automatically keep retrying as long as the command returns a non-zero exit status and then exit the loop immediately when the command succeeds, without extra negation or break statements?

  • A case statement that evaluates the test command's exit status.

  • A while loop that surrounds the test command.

  • A for loop that iterates over a fixed sequence of retry counts.

  • An until loop that surrounds the test command.

Question 17 of 20

After a new security-hardening Group Policy Object (GPO) was linked to the OU that contains a Windows Server 2022 file-backup server, the custom BackupAgent service-configured to run under the DOMAIN\backup_svc account-now fails to start.

System-level Event ID 7000 shows: "The BackupAgent service failed to start due to the following error: The service did not start due to a logon failure."

The DOMAIN\backup_svc password has not changed, DNS and network connectivity test cleanly, and no firewall rules were modified. Which specific User Rights Assignment setting in the GPO is the MOST likely cause and should be corrected to restore the service?

  • Assign the DOMAIN\backup_svc account the Log on as a batch job right

  • Remove the account from Deny log on through Remote Desktop Services

  • Grant the DOMAIN\backup_svc account the Log on as a service right

  • Add the DOMAIN\backup_svc account to Allow log on locally

Question 18 of 20

An administrator is troubleshooting why a standalone file server has stopped receiving the company's regularly scheduled security updates from WSUS. Tests confirm that WSUS connectivity and network access are normal. The host runs Windows Server 2012 R2 Datacenter, and WindowsUpdate.log contains the message "This operating system version is no longer supported." In addition, the newest version of the third-party backup agent refuses to install because it "requires Windows Server 2019 or later." The physical server model is still listed on the vendor's current hardware-compatibility list, and management wants the least possible downtime for the file shares.

Which action provides the best long-term remediation for both patching and third-party software support?

  • Manually download individual security hotfixes from the Microsoft Update Catalog each month and install them with PowerShell.

  • Leave the existing OS in place but block all internet traffic to and from the host at the perimeter firewall.

  • Enroll the server in Microsoft's paid Extended Security Updates (ESU) program to continue receiving critical patches until 2026.

  • Perform an in-place upgrade of the server to a currently supported Windows Server LTSC release (for example, Windows Server 2022) while preserving roles and data.

Question 19 of 20

A systems administrator is configuring a new application on a Linux server. The application needs to connect to a database server with the hostname db1.corp.local. When testing the connection, the administrator receives the following error: Could not resolve hostname db1.corp.local: Name or service not known. The administrator verifies that the application server has network connectivity by successfully pinging the IP address of its default gateway. Which of the following is the MOST likely cause of this error?

  • A firewall rule is blocking traffic to the database server.

  • The server's /etc/resolv.conf file is misconfigured.

  • The server's primary network adapter is disabled.

  • The server's routing table is missing a route to the database subnet.

Question 20 of 20

A company's primary datacenter is located directly on a major seismic fault line. The systems administrator must choose where to keep the weekly backup copies of 30 TB of engineering data so that the organization can continue operating if an earthquake destroys the facility. Which storage location BEST satisfies the data-security principle of physical location separation for this scenario?

  • An encrypted external drive stored in a safe two floors above the datacenter

  • A virtual tape library that shares the production SAN's disk shelves

  • A cloud provider's region 450 km away on a different power grid and tectonic plate

  • A Tier III colocation facility 5 km away in the same metropolitan area