CompTIA SK0-005.pdf
Q: 1
Which of the following types of physical security controls would most likely be a target of a social
engineering attack?
Options
Q: 2
Which of the following policies would be BEST to deter a brute-force login attack?
Options
Q: 3
An administrator needs to perform bare-metal maintenance on a server in a remote datacenter.
Which of the following should the administrator use to access the server’s console?
Options
Q: 4
A company deploys antivirus, anti-malware, and firewalls that can be assumed to be functioning
properly. Which of the following is the MOST likely system vulnerability?
Options
Q: 5
Which of the following must a server administrator do to ensure data on the SAN is not compromised
if it is leaked?
Options
Q: 6
A technician is configuring a server that requires secure remote access. Which of the following ports
should the technician use?
Options
Q: 7
Which of the following is typical of software licensing in the cloud?
Options
Q: 8
Which of the following open ports should be closed to secure the server properly? (Choose two.)
Options
Q: 9
Which of the following would be BEST to help protect an organization against social engineering?
Options
Q: 10
A systems administrator is setting up a new server that will be used as a DHCP server. The
administrator installs the OS but is then unable to log on using Active Directory credentials.The
administrator logs on using the local administrator account and verifies the server has the correct IP
address, subnet mask, and default gateway. The administrator then gets on another server and can
ping the new server. Which of the following is causing the issue?
Options
Question 1 of 10