New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA SK0-005 Exam - Topic 1 Question 30 Discussion

Actual exam question for CompTIA's SK0-005 exam
Question #: 30
Topic #: 1
[All SK0-005 Questions]

Which of the following are measures that should be taken when a data breach occurs? (Select TWO).

Show Suggested Answer Hide Answer
Suggested Answer: A, E

Contribute your Thoughts:

0/2000 characters
Viva
4 months ago
Disagree, running an antivirus scan isn't enough on its own.
upvoted 0 times
...
Twanna
4 months ago
Definitely need to identify the vulnerability first.
upvoted 0 times
...
Dwight
4 months ago
Wait, can you really just move the data? Seems risky.
upvoted 0 times
...
Frank
4 months ago
Disclosing the incident is crucial too.
upvoted 0 times
...
Dortha
4 months ago
Restoring from backup is a must!
upvoted 0 times
...
Galen
5 months ago
I think we should definitely disclose the incident, but I’m not confident about the second option. I remember something about moving data, but that seems risky.
upvoted 0 times
...
Madonna
5 months ago
I feel like disabling unnecessary ports is a good security measure, but I can't recall if it's specifically for after a breach. I might go with identifying the vulnerability too.
upvoted 0 times
...
Sheldon
5 months ago
I remember a practice question where we had to disclose incidents, so I feel like that could be one of the answers. But I’m torn between that and running an antivirus scan.
upvoted 0 times
...
Darci
5 months ago
I think restoring the data from backup is definitely important, but I'm not sure about the second choice. Maybe identifying the exploited vulnerability?
upvoted 0 times
...
Tran
5 months ago
This is a classic risk-return tradeoff. I'll weigh the potential upside and downside of each project before making my choice.
upvoted 0 times
...
Noel
5 months ago
This looks like a tricky one. I'll need to think through the different options carefully.
upvoted 0 times
...
Isabelle
5 months ago
I think we worked through a case study that suggested every bribe involves hidden players, but I’m a bit unsure if that’s always the case.
upvoted 0 times
...

Save Cancel