exam questions

Exam SK0-005 All Questions

View all questions & answers for the SK0-005 exam

Exam SK0-005 topic 1 question 361 discussion

Actual exam question from CompTIA's SK0-005
Question #: 361
Topic #: 1
[All SK0-005 Questions]

IDS alerts indicate abnormal traffic patterns are coming from a specific server in a data center that hosts sensitive data. Upon further investigation, the server administrator notices this server has been infected with a virus due to an exploit of a known vulnerability from its database software. Which of the following should the administrator perform after removing the virus to mitigate this issue from reoccurring and to maintain high availability? (Choose three.)

  • A. Run a vulnerability scanner on the server.
  • B. Repartition the hard drive that houses the database.
  • C. Patch the vulnerability.
  • D. Enable a host firewall.
  • E. Reformat the OS on the server.
  • F. Update the antivirus software.
  • G. Remove the database software.
  • H. Air gap the server from the network.
Show Suggested Answer Hide Answer
Suggested Answer: ACF 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
cj207800
3 days, 16 hours ago
Selected Answer: ACF
the given answer is correct
upvoted 1 times
...
[Removed]
5 months ago
Selected Answer: ACF
The server was infected, so you definitively need to update the AV. Answer is ACF
upvoted 3 times
...
surfuganda
10 months ago
Selected Answer: ACD
A. Run a vulnerability scanner on the server. This action will help identify any existing vulnerabilities, including but not limited to the one that was exploited. It's an essential step for ensuring that all potential security weaknesses are identified and can be addressed. C. Patch the vulnerability. Once the specific vulnerability that was exploited is identified, patching it is critical to prevent future exploits of the same weakness. Regularly updating and patching the system and its software components is a fundamental security practice. D. Enable a host firewall. A host-based firewall can provide an additional layer of security by controlling incoming and outgoing network traffic based on an applied rule set. It can help mitigate the risk of future infections by blocking unauthorized access attempts and limiting the spread of any potential intrusion.
upvoted 1 times
ccoli
5 months, 2 weeks ago
Incorrect. There is no reason to assume host firewall isn't enabled (when would it ever not be?). The listed answer is correct.
upvoted 1 times
[Removed]
5 months ago
Furthermore, the server was infected, so you definitively need to update the AV. Answer is ACF
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago