Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CompTIA Server+ SK0-004: Security STUDY Guide, Exams of Computer Science

CompTIA Server+ SK0-004: Security STUDY Guide. Match the firewall type to its characteristics. - ✔ Network-based firewall - Contains software components but run on a server. - Segregates a LAN from devices on a untrusted network. Host-based firewall - Allows administrators to have some control over device safety away from the home network. - Software that lets you control communication to a single system. Which statements are the examples of application hardening techniques? - ✔ Installin

Typology: Exams

2021/2022

Available from 01/08/2023

DrShirley
DrShirley 🇺🇸

3.7

(3)

1.5K documents

1 / 3

Toggle sidebar

Related documents


Partial preview of the text

Download CompTIA Server+ SK0-004: Security STUDY Guide and more Exams Computer Science in PDF only on Docsity! CompTIA Server+ SK0-004: Security STUDY Guide. Match the firewall type to its characteristics. - ✔ Network-based firewall - Contains software components but run on a server. - Segregates a LAN from devices on a untrusted network. Host-based firewall - Allows administrators to have some control over device safety away from the home network. - Software that lets you control communication to a single system. Which statements are the examples of application hardening techniques? - ✔ Installing latest patches. Disabling unneeded services. Which statements state the purpose of endpoint security? - ✔ Deals with attacks against network systems that originate from end-user devices. Involves protecting end-user devices. You're evaluating different backup powers options for your server farm. What ratings should you be concerned with? - ✔ UPS ratings. (Uninterrupted Power Supply) Which STATEMENTS describe the the considerations for choosing a UPS devcice? - ✔ Bypass procedures. Run-time. Capacity. Which device supplies multiple power outlets that are designed to distribute power to all your devices? - ✔ PDU (Power Distribution Unit) Which statements describe the features and characteristics of a vulnerability scan? - ✔ You can scan a system by specifying a range of IP addresses. Vulnerability scanners will frequently install patches automatically. Which statements describe the ways to avoid damaging the internal components of a computer while performing repairs? - ✔ Stand on a ESD mat. (electrostatic discharge) Use an ESD strap. (electrostatic discharge) Which statements describe the considerations for safety in a server room? - ✔ Rack stability. Floor load limitations. You want to grant access to certain members in the finance department who are due to begin work on a project. The project will require resources from all levels of the department.What method should you use to grant these permissions? - ✔ User permissions Which statement describes the purpose of an extranet? - ✔ A network that is exposed only to selected parties. Which statements rightly describes the characteristics of mantraps? - ✔ Minimizes piggybacking. Facilitates additional levels of security. You have a server room configured where the front of each rack is facing each other and the backs are facing each other. What type of aisle is at the back of the server racks? - ✔ Hot aisle. Which statements are the examples of OS hardening techniques? - ✔ Installing the latest OS patches. Closing any unneeded ports. You have the security settings on your laptop set so that when you access a public network you need to provide a username, a password, and a fingerprint scan. How many factor authentications are being used? - ✔ 2 Which statements describe characteristics of the Access Control Lists (ACL)? - ✔ They allow or deny traffic based on IP and port. You need to associate Access Control List (ACL) with interfaces on a network. On what type of resource can you configure Access Control Lists (ACL) to route traffic based on the port it's destined for? - ✔ Router. Which statements are the examples of hardware hardening techniques? - ✔ Using BIOS passwords. Setting a boot order. Match the authentication protocols to their descriptions. - ✔ LDAP (Lightweight Directory Access Protocol)- Lets users access a database without placing extensive processing strain on the server. RADIUS (Remote Authentication Dial-In-User Service) - Uses different network technologies to authenticate or implement authentication TACACS+ (Terminal Access Controller Access Control Server) - Encrypts all the information that's sent between the client and the server.