Hackers recently targeted a company with an attack that resulted in a system breach, which compromised the organization's data. Because of the system breach, the administrator had to bypass normal change management procedures. Which of the following change management activities was necessary?
A. Cancelled change request
B. Change request postponement
C. Emergency change request
D. Privilege change request
E. User permission change request
Which of the following licensing models allows the greatest number of concurrent Windows VMS to run on a host for the lowest cost?
A. per user
B. per core
C. Per instance
D. Per concurrent user
A systems administrator needs to back up changes made to a data store on a daily basis during a short time frame. The administrator wants to maximize RTO when restoring data. Which of the following backup methodologies would best fit this scenario?
A. Off-site backups
B. Full backups
C. Differential backups
D. Incremental backups
Due to a disaster incident on a primary site, corporate users are redirected to cloud services where they will be required to be authenticated just once in order to use all cloud services.
Which of the following types of authentications is described in this scenario?
A. MFA
B. NTLM
C. Kerberos
D. SSO
A server administrator deployed a new product that uses a non-standard port for web access on port 8443. However, users are unable to access the new application. The server administrator checks firewall rules and determines 8443 is allowed. Which of the following is most likely the cause of the issue?
A. Intrusion detection is blocking the port.
B. The new application's DNS entry is incorrect.
C. The application should be changed to use port 443.
D. The core switch has a network issue.
Which of the following open ports should be closed to secure the server properly? (Choose two.)
A. 21
B. 22
C. 23
D. 53
E. 443
F. 636
Which of the following attacks is the most difficult to mitigate with technology?
A. Ransomware
B. Backdoor
C. SQL injection
D. Phishing
Which of the following types of asset management documentation is commonly used as a reference when processing the replacement of a faulty server component?
A. Warranty
B. Purchase order
C. License
D. Baseline document
A technicianretailed a new4TBharddrive inaWindows server. Which of the following should the technician perform FIRST to provision the newdrive?
A. Configure the drive as a base disk.
B. Configure the drive as a dynamic disk.
C. Partition the drive using MBR.
D. Partition the drive using OPT.
A server administrator is currently working on an incident. Which of the following steps should the administrator perform before resolving the issue?
A. Inform the impacted users.
B. Make the changes to the system.
C. Determine the probable causes.
D. Identify changes to the server.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your SK0-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.