CompTIA Security+ Quiz 9
What is the minimum number of load balancers needed to configure active/active load balancing?
2
Which of the following relates to the term Data Sovereignty?
Country specific laws and regulations
Maja has been asked to investigate DDoS mitigations. Which of the following should Maja consider?
DNS sinkhole
Which of these is NOT used in scheduling a load balancer?
Data within the application message itself
Which of the following functions does a network hardware security module NOT perform?
Fingerprint authentication
Which of the following term relates to the accuracy and consistency of data?
Integrity
Which statement regarding a demilitarized zone (DMZ) is NOT true?
It contains servers that are used only by internal network users.
How does BPDU guard provide protection?
It detects when a BPDU is received from an endpoint.
Which of the following is NOT correct about L2TP?
It must be used on HTML5 compliant devices.
Leah is researching information on firewalls. She needs a firewall that allows for more generic statements instead of creating specific rules. What type of firewall should Leah consider purchasing that supports her need?
Policy-based firewall
Which of the following is NOT a NAC option when it detects a vulnerable endpoint?
Update Active Directory to indicate the device is vulnerable.
Which of the following is NOT a firewall rule parameter?
Visibility
Which of the following offerings can be provided by a Cloud Access Service Broker (CASB)? [Choose all that apply]
a. Malware prevention b. Cloud governance c. Data Loss Prevention (DLP) d. Threat prevention e. Identity and Access Management (IAM)
Which of the following statements describe the implications of IPv6? [Choose all that apply]
a. Networks need to be upgraded or redesigned b. Devices and operating systems need to be upgraded c. IPv6 addresses are long and difficult to remember d. The adoption of IPv6 is still missing with many organizations
What is a virtual firewall?
A firewall that runs in the cloud
In which of the following configurations are all the load balancers always active?
Active-active
Which firewall rule action implicitly denies all other traffic unless explicitly allowed?
Allow
Which feature of Windows 10 establishes a persistent virtual private network (VPN) connection when there is Internet connectivity?
Always On VPN
Which type of monitoring methodology looks for statistical deviations from a baseline?
Anomaly monitoring
Which device intercepts internal user requests and then processes those requests on behalf of the users?
Forward proxy server
Which of the following contains honeyfiles and fake telemetry?
High-interaction honeypot
Which of the following is not a basic configuration management tool?
MAC address schema
Hanna has received a request for a data set of actual data for testing a new app that is being developed. She does not want the sensitive elements of the data to be exposed. What technology should she use?
Masking
Sofie needs to configure the VPN to preserve bandwidth. Which configuration would she choose?
Split tunnel
Emilie is reviewing a log file of a new firewall. She notes that the log indicates packets are being dropped for incoming packets for which the internal endpoint did not initially create the request. What kind of firewall is this?
Stateful packet filtering
Which of these appliances provides the broadest protection by combining several security functions?
UTM
Which of the following should be mentioned by a network diagram? [Choose all that apply.]
a. Devices present on the network b. Connectivity between the devices c. IP addresses and names of the devices
When setting up a data center in a particular geography, which of the following points must be considered? [Choose all that apply]
a. Fiber backbone availability b. Power availability c. Locations of the customers d. Type of connectivity available e. Internet service provider's presence
Which of the following tasks can be performed using the out-of-band management feature in network devices? [Choose all that apply]
a. Reboot the network device b. Reinstall the operating system c. Upgrade the firmware d. Power-on the network device e. Perform maintenance
Which of the following are ways of configuring access control lists (ACL)? [Choose all that apply]
a. Using an effective right mask b. Per-group basis c. Per-user basis