CompTIA Security+ Certification Exam SY0-701 Practice Test 11 Flashcards

1
Q

Which of the answers listed below refer to the concept of data isolation? (Select 2 answers)

A) DLP
B) SDN
C) EFS
D) SWG
E) EDR

A

A) DLP

C) EFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of firewall used for protecting a single computer is commonly referred to as: (Select 2 answers)

A) Hardware firewall
B) Host-based firewall
C) Proxy firewall
D) Network-based firewall
E) Personal firewall

A

B) Host-based firewall

E) Personal firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following provides active network security breach response on an individual computer system?

A) NIDS
B) HIDS
C) NIPS
D) HIPS

A

D) HIPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of securing networking devices should include the practice of disabling unused physical and logical ports.

A) True

B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The importance of changing default usernames and passwords can be illustrated on the example of certain network devices (such as routers) which are often shipped with default and well-known admin credentials that can be looked up on the web.

A) True

B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The term “Hybrid cloud” refers to a mixed computing environment that can include different cloud service models like public and private clouds, as well as on-premises infrastructure.

A) True

B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A type of document outlining the shared responsibilities between a CSP and its customers for securing and managing data and resources is known as: (Select best answer)

A) Service Level Agreement
B) Acceptable Use Policy
C) Cloud Responsibility Matrix
D) Master Service Agreement

A

C) Cloud Responsibility Matrix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the terms listed below refers to a method for managing infrastructure resources through scripts and templates?

A) IaaS
B) ML
C) IaC
D) SDN

A

C) IaC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A serverless architecture allows developers to create apps and services without having to manage the required infrastructure resources (such as servers, databases, and storage systems), which are handled by:

A) CSP
B) ISP
C) MSP
D) IdP

A

A) CSP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In software engineering, the term “Microservice” describes independent and self-contained code components that can be put together to form an application.

A) True

B) False

A

A) True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the answers listed below refers to a means for logical network segmentation?

A) Switch
B) VLAN
C) Screened subnet
D) Router

A

B) VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following answers refers to software technology designed to simplify network infrastructure management?

A) SDN
B) SaaS
C) VDI
D) SNMP

A

A) SDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the answers listed below refers to the process of packaging an application and its dependencies into a single, self-contained unit, which can run across different computing environments?

A) Edge computing
B) Containerization
C) Virtualization
D) Cloud computing

A

B) Containerization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following answers refers to a solution that allows multiple OSs to work simultaneously on the same hardware?

A) Clustering
B) Hyperthreading
C) Multitasking
D) Virtualization

A

D) Virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the answers listed below refers to a network of interconnected devices equipped with sensors (such as wearable tech or home automation devices) that can interact with each other to perform various tasks and functions?

A) ICS
B) PAN
C) IoT
D) SoC

A

C) IoT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following refers to a broad term that encompasses various control and automation systems used in industrial settings to control and monitor physical processes and machinery?

A) ICS
B) PLC
C) SCADA
D) HMI

A

A) ICS

17
Q

Which of the answers listed below refers to a specific type of ICS?

A) SoC
B) CMS
C) SCADA
D) RTOS

A

C) SCADA

18
Q

Which of the following answers refers to an OS type characterized by low delay between the execution of tasks required in specific applications, such as in military missile guidance systems or in automotive braking systems?

A) Unix-like OS
B) SoC
C) Firmware
D) RTOS

A

D) RTOS

19
Q

Which of the answers listed below refer(s) to embedded systems? (Select all that apply)

A) Often designed to operate in real-time or with low latency

B) Typically equipped with constrained computing resources and storage

C) Designed to perform a single task or a few closely related tasks within a larger system

D) Often integrated with hardware components like sensors and actuators

A

A) Often designed to operate in real-time or with low latency

B) Typically equipped with constrained computing resources and storage

C) Designed to perform a single task or a few closely related tasks within a larger system

D) Often integrated with hardware components like sensors and actuators

20
Q

Which of the following terms can be used to describe a system designed to aim for minimized downtime and uninterrupted operation?

A) ICS
B) HA
C) RTOS
D) SoC

A

B) HA

21
Q

Which of the answers listed below refers to a device failure mode in which maintaining service availability is prioritized over security?

A) Fail-safe
B) Fail-close
C) Fail-open
D) Fail-secure

A

C) Fail-open

22
Q

Which failure mode prioritizes security over availability, ensuring that no potentially malicious traffic can get through the device?

A) Fail-soft
B) Fail-through
C) Fail-safe
D) Fail-close

A

D) Fail-close

23
Q

Which of the following answers refer to passive network monitoring techniques? (Select 2 answers)

A) Network tap
B) Trunk port
C) Port mirroring
D) SNMP trap
E) Registered port

A

A) Network tap

C) Port mirroring

24
Q

A type of hardened server used as a secure gateway for remote administration of devices placed in a different security zone is called:

A) C2 server
B) Jump server
C) UC server
D) Proxy server

A
25
Q

Which of the following provides isolation from external computer networks?

A) Network segmentation
B) Air gap
C) Hardware firewall
D) Protected cable distribution

A

B) Air gap