Lesson 12 - Questions Flashcards
What use is made of a TPM for NAC attestation?
Why are OS-enforced file access controls not sufficient in the event of the loss or theft of a computer or mobile device?
What use is a TPM when implementing full disk encryption?
What countermeasures can you use against the threat of malicious firmware code?
What type of interoperability agreement would be appropriate at the outset of two companies agreeing to work with one another?
What type of interoperability agreement is designed to ensure specific performance standards?
What is a hardened configuration?
True or false? Only Microsoft’s operating systems and applications require security patches.
Antivirus software has reported the presence of malware but cannot remove it automatically. Apart from the location of the affected file, what information will you need to remediate the system manually?
You are consulting with a medium-size company about endpoint security solutions. What advantages does a cloud-based analytics platform have over an on-premises solution that relies on signature updates?
If you suspect a process of being used for data exfiltration but the process is not identified as malware by A-V software, what types of analysis tools will be most useful?
Other than cost, which factor primarily constrains embedded systems in terms of compute and networking?
True or false? While fully customizable by the customer, embedded systems are based on either the Raspberry Pi or the Arduino design.
What addressing component must be installed or configured for NB-IoT?
You are assisting with the preparation of security briefings on embedded systems tailored to specific implementations of embedded systems. Following the CompTIA Security+ syllabus, you have created the industry-specific advice for the following sectors—which one do you have left to do?
Facilities, Industrial, Manufacturing, Energy, ???