Free CompTIA SK0-005 Exam Braindumps (page: 9)

95.3% Passing Rate DOWNLOAD PDF EXAM
540 Questions & Answers
Page 9 of 92

Which of the following open ports should be closed to secure the server properly? (Choose two.)

  1. 21
  2. 22
  3. 23
  4. 53
  5. 443
  6. 636

Answer(s): A,C

Explanation:

The administrator should close ports 21 and 23 to secure the server properly. Port 21 is used for FTP (File Transfer Protocol), which is an unsecure protocol that allows file transfer between a client and a server over a network connection. FTP does not encrypt the data or the credentials that are transmitted, making them vulnerable to interception or modification by attackers. Port 23 is used for Telnet, which is an unsecure protocol that allows remote login and command execution over a network connection using a CLI. Telnet does not encrypt the data or the credentials that are transmitted, making them vulnerable to interception or modification by attackers.


Reference:

https://www.csoonline.com/article/3191531/securing-risky-network-ports.html



Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?

  1. Encrypt the data that is leaving the SAN
  2. Encrypt the data at rest
  3. Encrypt the host servers
  4. Encrypt all the network traffic

Answer(s): B

Explanation:

The administrator must encrypt the data at rest to ensure data on the SAN is not compromised if it is leaked. Data at rest refers to data that is stored on a device or a medium, such as a hard drive, a flash drive, or a SAN (Storage Area Network). Data at rest can be leaked if the device or the medium is lost, stolen, or accessed by unauthorized parties. Encrypting data at rest means applying an algorithm that transforms the data into an unreadable format that can only be decrypted with a key. Encryption protects data at rest from being exposed or misused by attackers who may obtain the device or the medium.



A server technician has been asked to upload a few files from the internal web server to the internal FTP server. The technician logs in to the web server using PuTTY, but the connection to the FTP server fails. However, the FTP connection from the technician's workstation is sucessful. To troubleshoot the issue, the technician executes the following command on both the web server and the workstation:

ping ftp.acme.local

The IP address in the command output is different on each machine.
Which of the following is the MOST likely reason for the connection failure?

  1. A misconfigured firewall
  2. A misconfigured hosts.deny file
  3. A misconfigured hosts file
  4. A misconfigured hosts.allow file

Answer(s): D

Explanation:

A misconfigured hosts file can cause name resolution issues on a server. A hosts file is a text file that maps hostnames to IP addresses on a local system. It can be used to override DNS settings or provide custom name resolution for testing purposes. However, if the hosts file contains incorrect or outdated entries, it can prevent the system from resolving hostnames properly and cause connectivity problems. To fix this issue, the administrator should check and edit the hosts file accordingly.



A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning properly.
Which of the following is the MOST likely system vulnerability?

  1. Insider threat
  2. Worms
  3. Ransomware
  4. Open ports
  5. Two-person integrity

Answer(s): A

Explanation:

Insider threat is the most likely system vulnerability in a company that deploys antivirus, anti- malware, and firewalls that can be assumed to be functioning properly. An insider threat is a malicious or negligent act by an authorized user of a system or network that compromises the security or integrity of the system or network. An insider threat can include data theft, sabotage,

espionage, fraud, or other types of attacks. Antivirus, anti-malware, and firewalls are security tools that can protect a system or network from external threats, such as viruses, worms, ransomware, or open ports. However, these tools cannot prevent an insider threat from exploiting their access privileges or credentials to harm the system or network.






Post your Comments and Discuss CompTIA SK0-005 exam prep with other Community members:

SK0-005 Exam Discussions & Posts