CompTIA Security+ Quiz 9

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is the minimum number of load balancers needed to configure active/active load balancing?

2

Which of the following relates to the term Data Sovereignty?

Country specific laws and regulations

Maja has been asked to investigate DDoS mitigations. Which of the following should Maja consider?

DNS sinkhole

Which of these is NOT used in scheduling a load balancer?

Data within the application message itself

Which of the following functions does a network hardware security module NOT perform?

Fingerprint authentication

Which of the following term relates to the accuracy and consistency of data?

Integrity

Which statement regarding a demilitarized zone (DMZ) is NOT true?

It contains servers that are used only by internal network users.

How does BPDU guard provide protection?

It detects when a BPDU is received from an endpoint.

Which of the following is NOT correct about L2TP?

It must be used on HTML5 compliant devices.

Leah is researching information on firewalls. She needs a firewall that allows for more generic statements instead of creating specific rules. What type of firewall should Leah consider purchasing that supports her need?

Policy-based firewall

Which of the following is NOT a NAC option when it detects a vulnerable endpoint?

Update Active Directory to indicate the device is vulnerable.

Which of the following is NOT a firewall rule parameter?

Visibility

Which of the following offerings can be provided by a Cloud Access Service Broker (CASB)? [Choose all that apply]

a. Malware prevention b. Cloud governance c. Data Loss Prevention (DLP) d. Threat prevention e. Identity and Access Management (IAM)

Which of the following statements describe the implications of IPv6? [Choose all that apply]

a. Networks need to be upgraded or redesigned b. Devices and operating systems need to be upgraded c. IPv6 addresses are long and difficult to remember d. The adoption of IPv6 is still missing with many organizations

What is a virtual firewall?

A firewall that runs in the cloud

In which of the following configurations are all the load balancers always active?

Active-active

Which firewall rule action implicitly denies all other traffic unless explicitly allowed?

Allow

Which feature of Windows 10 establishes a persistent virtual private network (VPN) connection when there is Internet connectivity?

Always On VPN

Which type of monitoring methodology looks for statistical deviations from a baseline?

Anomaly monitoring

Which device intercepts internal user requests and then processes those requests on behalf of the users?

Forward proxy server

Which of the following contains honeyfiles and fake telemetry?

High-interaction honeypot

Which of the following is not a basic configuration management tool?

MAC address schema

Hanna has received a request for a data set of actual data for testing a new app that is being developed. She does not want the sensitive elements of the data to be exposed. What technology should she use?

Masking

Sofie needs to configure the VPN to preserve bandwidth. Which configuration would she choose?

Split tunnel

Emilie is reviewing a log file of a new firewall. She notes that the log indicates packets are being dropped for incoming packets for which the internal endpoint did not initially create the request. What kind of firewall is this?

Stateful packet filtering

Which of these appliances provides the broadest protection by combining several security functions?

UTM

Which of the following should be mentioned by a network diagram? [Choose all that apply.]

a. Devices present on the network b. Connectivity between the devices c. IP addresses and names of the devices

When setting up a data center in a particular geography, which of the following points must be considered? [Choose all that apply]

a. Fiber backbone availability b. Power availability c. Locations of the customers d. Type of connectivity available e. Internet service provider's presence

Which of the following tasks can be performed using the out-of-band management feature in network devices? [Choose all that apply]

a. Reboot the network device b. Reinstall the operating system c. Upgrade the firmware d. Power-on the network device e. Perform maintenance

Which of the following are ways of configuring access control lists (ACL)? [Choose all that apply]

a. Using an effective right mask b. Per-group basis c. Per-user basis


संबंधित स्टडी सेट्स

U.S. History (Constitutional Convention)

View Set

Vocab Level G Unit 4: Choosing the Right Word

View Set

Upper Resp. & COPD: Adaptive Quizzing

View Set

Ch. 10 ~ Information technology (exam 3)

View Set

Chapter 14 PNS (Cranial and Spinal Nerves)

View Set

Pharm - Archer Review (3/4) - Endocrine, Analgesics, GI/Nutrition, Urinary/Renal and Electrolytes, Respiratory, Integumentary, Musculoskeletal, Visual/Auditory

View Set