Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

SK0-005 Exam Dumps - CompTIA Server+ Certification Exam

Go to page:
Question # 41

Which of the following is the most effective way to mitigate risks associated with privacy-related data leaks when sharing with a third party?

A.

Third-party acceptable use policy

B.

Customer data encryption and masking

C.

Non-disclosure and indemnity agreements

D.

Service- and operational-level agreements

Full Access
Question # 42

A server is only able to connect to a gigabit switch at 100Mb. Other devices are able to access the network port at full gigabit speeds, and when the server is brought to another location, it is able to connect at full gigabit speed. Which of the following should an administrator check first?

A.

The switch management

B.

The VLAN configuration

C.

The network cable

D.

The network drivers

Full Access
Question # 43

A server administrator is installing a new server on a manufacturing floor. Because the server is publicly accessible, security requires the server to undergo hardware hardening. Which of the following actions should the administrator take?

A.

Close unneeded ports.

B.

Disable unused services.

C.

Set a BIOS password.

D.

Apply driver updates.

Full Access
Question # 44

The management team has mandated the use of data-at-rest encryption for all data. Which of the following forms of encryption best achieves this goal?

    Drive

    Database

    Folder

A.

File

Full Access
Question # 45

An administrator notices high traffic on a certain subnet and would like to identify the source of the traffic. Which of the following tools should the administrator utilize?

A.

Anti-malware

B.

Nbtstat

C.

Port scanner

D.

Sniffer

Full Access
Question # 46

A technician notices that every time a server is powered on, it turns off after several minutes. After reviewing logs, the technician notices the server registers execution of the shutdown. Which of the following should the technician do to fix this issue?

A.

Reset the memory modules

B.

Check for fan failure

C.

Change the VM password

D.

Set credentials for the remote console

Full Access
Question # 47

Which of the following types of physical security controls would most likely be a target of a social engineering attack?

A.

A security guard

B.

An access control vestibule

C.

Perimeter fencing

D.

Biometric locks

E.

Bollards

Full Access
Question # 48

Due to a disaster incident on a primary site, corporate users are redirected to cloud services where they will be required to be authenticated just once in order to use all cloud services.

Which of the following types of authentications is described in this scenario?

A.

MFA

B.

NTLM

C.

Kerberos

D.

SSO

Full Access
Go to page: