A server technician in a datacenter configures a daemon to monitor the battery health in a UPS. Over a two day time period, the daemon generates a warning message. Which of the following represents the FIRST action that should be taken by the server technician?
A. Perform a test on the UPS batteries
B. Immediately replace the UPS batteries
C. Move the servers connected to the UPS to another existing UPS
D. Immediately replace the UPS with a new UPS
A server unexpectedly shut down as a result of overheating. An alert was sent to the administrator's email address but the administrator was away from the workstation when the alert arrived. Which of the following would have been a more effective method for sending the alert notification?
A. Broadcast messages
B. SMS messages
C. Telephone calls
D. Console notifications
Which of the following methods should a technician perform to properly clear a hard drive before disposal?
A. Delete the FAT
B. Zero all block sectors
C. Delete the partition
D. Zero the NTFS journal
Network devices between two firewalls are included in which of the following?
A. VPN
B. SAN
C. VLAN
D. DMZ
A system administrator is tasked with dividing the network so that each department is separate from the other. Which of the following should be used to accomplish this task?
A. VLAN
B. VPN
C. VNC
D. VM
Which of the following is an example of the principle of least privilege and is the MOST secure when granting access to a shared network drive used by the Accounting department?
A. Grant appropriate permissions to only users in the Accounting department for both the share and NTFS
B. Grant all users full control permissions for the share only
C. Grant the Accounting department full control for the share and appropriate NTFS permissions
D. Grant modify permissions to the Accounting department and deny NTFS permissions to all other users
A company has recently had sensitive data stolen by a contractor who plugged a flash drive into a server. Which of the following is the BEST method to prevent future occurrences?
A. Disable any unused physical ports until needed
B. Implement a BIOS password on all the servers
C. Install chassis locks on all the servers
D. Restrict usage of flash drives in company policy
A network administrator is tasked to block all outbound SSH connections on the default port from a network subnet of 10.152.8.0/21 on a Linux based firewall. Which of the following rule sets would accomplish this task?
A. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 22 -j REJECT
B. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 23 -j REJECT
C. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 22 -j ACCEPT
D. iptables -i OUTPUT -d 10.152.8.0/21 -p TCP --dport 23 -j ACCEPT
Which of the following provides two-factor authentication?
A. Bank card and PIN.
B. Username and password.
C. Fingerprint and iris scan.
D. Key and proximity badge.
Which of the following is the MOST secure method of storing critical and sensitive system information (e.g., administrative passwords, trusted signing keys)?
A. Store the information encrypted and offline in a storage safe.
B. Encrypt the information using a zip file with a password.
C. Utilize a drive with full disk encryption enabled.
D. Create an encrypted virtual disk for storage.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SK0-004 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.