Lesson 12 - Questions Flashcards

1
Q

What use is made of a TPM for NAC attestation?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are OS-enforced file access controls not sufficient in the event of the loss or theft of a computer or mobile device?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What use is a TPM when implementing full disk encryption?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What countermeasures can you use against the threat of malicious firmware code?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of interoperability agreement would be appropriate at the outset of two companies agreeing to work with one another?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of interoperability agreement is designed to ensure specific performance standards?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a hardened configuration?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or false? Only Microsoft’s operating systems and applications require security patches.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Antivirus software has reported the presence of malware but cannot remove it automatically. Apart from the location of the affected file, what information will you need to remediate the system manually?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are consulting with a medium-size company about endpoint security solutions. What advantages does a cloud-based analytics platform have over an on-premises solution that relies on signature updates?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If you suspect a process of being used for data exfiltration but the process is not identified as malware by A-V software, what types of analysis tools will be most useful?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Other than cost, which factor primarily constrains embedded systems in terms of compute and networking?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or false? While fully customizable by the customer, embedded systems are based on either the Raspberry Pi or the Arduino design.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What addressing component must be installed or configured for NB-IoT?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are assisting with the preparation of security briefings on embedded systems tailored to specific implementations of embedded systems. Following the CompTIA Security+ syllabus, you have created the industry-specific advice for the following sectors—which one do you have left to do?
Facilities, Industrial, Manufacturing, Energy, ???

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why should detailed vendor and product assessments be required before allowing the use of IoT devices in the enterprise?

A