Free CompTIA SK0-005 Exam Braindumps (page: 11)

A large number of connections to port 80 is discovered while reviewing the log files on a server. The server is not functioning as a web server.
Which of the following represent the BEST immediate actions to prevent unauthorized server access? (Choose two.)

  1. Audit all group privileges and permissions
  2. Run a checksum tool against all the files on the server
  3. Stop all unneeded services and block the ports on the firewall
  4. Initialize a port scan on the server to identify open ports
  5. Enable port forwarding on port 80
  6. Install a NIDS on the server to prevent network intrusions

Answer(s): C,F

Explanation:

The best immediate actions to prevent unauthorized server access are to stop all unneeded services and block the ports on the firewall. Stopping unneeded services reduces the attack surface of the server by eliminating potential entry points for attackers. For example, if the server is not functioning as a web server, there is no need to run a web service on port 80. Blocking ports on the firewall prevents unauthorized network traffic from reaching the server. For example, if port 80 is not needed for any legitimate purpose, it can be blocked on the firewall to deny any connection attempts on that port.



A company is running an application on a file server. A security scan reports the application has a known vulnerability.
Which of the following would be the company's BEST course of action?

  1. Upgrade the application package
  2. Tighten the rules on the firewall
  3. Install antivirus software
  4. Patch the server OS

Answer(s): A

Explanation:

The best course of action for the company is to upgrade the application package to fix the known vulnerability. A vulnerability is a weakness or flaw in an application that can be exploited by an attacker to compromise the security or functionality of the system. Upgrading the application package means installing a newer version of the application that has patched or resolved the vulnerability. This way, the company can prevent potential attacks that may exploit the vulnerability and cause damage or loss.



A technician runs top on a dual-core server and notes the following conditions:
top ­- 14:32:27, 364 days, 14 users load average 60.5 12.4 13.6

Which of the following actions should the administrator take?

  1. Schedule a mandatory reboot of the server
  2. Wait for the load average to come back down on its own
  3. Identify the runaway process or processes
  4. Request that users log off the server

Answer(s): C

Explanation:

The administrator should identify the runaway process or processes that are causing high load average on the server. Load average is a metric that indicates how many processes are either running on or waiting for the CPU at any given time. A high load average means that there are more processes than available CPU cores, resulting in poor performance and slow response time. A runaway process is a process that consumes excessive CPU resources without terminating or releasing them. A runaway process can be caused by various factors, such as programming errors, infinite loops, memory leaks, etc. To identify a runaway process, the administrator can use tools such as top, ps, or htop to monitor CPU usage and process status. To stop a runaway process, the administrator can use commands such as kill, pkill, or killall to send signals to terminate it.



A technician needs to set up a server backup method for some systems. The company's management team wants to have quick restores but minimize the amount of backup media required.
Which of the following are the BEST backup methods to use to support the management's priorities? (Choose two.)

  1. Differential
  2. Synthetic full
  3. Archive
  4. Full
  5. Incremental
  6. Open file

Answer(s): A,E

Explanation:

The best backup methods to use to support the management's priorities are differential and incremental. A backup is a process of copying data from a source to a destination for the purpose of restoring it in case of data loss or corruption. There are different types of backup methods that vary in terms of speed, efficiency, and storage requirements. Differential and incremental backups are two types of partial backups that only copy the data that has changed since the last full backup. A full backup is a type of backup that copies all the data from the source to the destination. A full backup provides the most complete and reliable restore option, but it also takes the longest time and requires the most storage space. A differential backup copies only the data that has changed since the last full backup. A differential backup provides a faster restore option than an incremental backup, but it also takes more time and requires more storage space than an incremental backup. An incremental backup copies only the data that has changed since the last backup, whether it was a full or an incremental backup. An incremental backup provides the fastest and most efficient backup option, but it also requires multiple backups to restore the data completely.






Post your Comments and Discuss CompTIA SK0-005 exam prep with other Community members:

SK0-005 Exam Discussions & Posts