Which of the following represent the BEST immediate actions to prevent unauthorized server access?

A large number of connections to port 80 is discovered while reviewing the log files on a server. The server is not functioning as a web server . Which of the following represent the BEST immediate actions to prevent unauthorized server access? (Choose two.)A . Audit all group privileges and...

July 25, 2021 No Comments READ MORE +

Which of the following tools will analyze network logs in real time to report on suspicious log events?

Which of the following tools will analyze network logs in real time to report on suspicious log events?A . SyslogB . DLPC . SIEMD . HIPSView AnswerAnswer: C Explanation: Reference: https://www.manageengine.com/products/eventlog/syslog-server.html

July 24, 2021 No Comments READ MORE +

Which of the following is causing the issue?

A systems administrator is setting up a new server that will be used as a DHCP server. The administrator installs the OS but is then unable to log on using Active Directory credentials. The administrator logs on using the local administrator account and verifies the server has the correct IP...

July 24, 2021 No Comments READ MORE +

Which of the following are likely causes of the issue?

A server that recently received hardware upgrades has begun to experience random BSOD conditions . Which of the following are likely causes of the issue? (Choose two.)A . Faulty memoryB . Data partition errorC . Incorrectly seated memoryD . Incompatible disk speedE . Uninitialized diskF . Overallocated memoryView AnswerAnswer: A,C

July 24, 2021 No Comments READ MORE +

Which of the following should the administrator use to access the server’s console?

An administrator needs to perform bare-metal maintenance on a server in a remote datacenter . Which of the following should the administrator use to access the server’s console?A . IP KVMB . VNCC . A crash cartD . RDPE . SSHView AnswerAnswer: D Explanation: Reference: https://phoenixnap.com/blog/what-is-bare-metal-server

July 23, 2021 No Comments READ MORE +

Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits?

Which of the following is a method that is used to prevent motor vehicles from getting too close to building entrances and exits?A . BollardsB . Reflective glassC . Security guardsD . Security camerasView AnswerAnswer: A Explanation: Reference: https://en.wikipedia.org/wiki/Bollard

July 23, 2021 No Comments READ MORE +

Which of the following should the company also perform as a data loss prevention method?

A company has implemented a requirement to encrypt all the hard drives on its servers as part of a data loss prevention strategy . Which of the following should the company also perform as a data loss prevention method?A . Encrypt all network trafficB . Implement MFA on all the...

July 23, 2021 No Comments READ MORE +

Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?

Which of the following is the MOST appropriate scripting language to use for a logon script for a Linux box?A . VBSB . ShellC . JavaD . PowerShellE . BatchView AnswerAnswer: A Explanation: Reference: https://redmondmag.com/articles/2016/02/09/logon-scripts-for-active-directory.aspx

July 23, 2021 No Comments READ MORE +

Which of the following would MOST likely help the analyst determine if the applications are running?

A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server . Which of the following would MOST likely help the analyst determine if the applications are running?A . User account controlB . Anti-malwareC . A snifferD . A...

July 23, 2021 No Comments READ MORE +

Which of the following should the technician do NEXT, given the disk is hot swappable?

A technician has been asked to check on a SAN. Upon arrival, the technician notices the red LED indicator shows a disk has failed . Which of the following should the technician do NEXT, given the disk is hot swappable?A . Stop sharing the volumeB . Replace the diskC ....

July 22, 2021 No Comments READ MORE +