Search Header Logo

Security + (SY0-601) Domain 3--Architecture & Design

Authored by Darrielle Flemming-Robinson

Computers, Professional Development, Instructional Technology

9th Grade - University

Used 14+ times

Security + (SY0-601) Domain 3--Architecture & Design
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Using a combination of firewalls, intrusion detection systems, content filters, encryption, and auditing procedures in the organization for protection against intrusions is an example of which of the following?

Defense in depth

Infrastructure as a Service

Community cloud

Layered security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of control is a surveillance system?

logical control

technical control

physical control

management control

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are the most compelling reasons that secure configuration baselines have been established? (Select 3 answers.)

industry standards

organization requests

governmental mandates

regulatory bodies

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following devices is used to accept encrypted connections from users and then send the connection to the server unencrypted?

VPN

DMZ

DDoS mitigation appliance

SSL accelerators

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are setting up a switched network and want to group users by department. Which technology should you implement?

DMZ

VPN

VLAN

NAT

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An organization has a sensitive network that needs to have physically isolated machines. Which of the following practices would be used to meet this requirement?

air gap

VLAN

RAS

honeynet

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An organization is experiencing a large amount of electromagnetic interference (EMI). Which of the following is the best method to provide continuous operations?

extra shielding

A generator

A redundant electric connection

A RAID configuration

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?