Security + (SY0-601) Domain 3--Architecture & Design

Security + (SY0-601) Domain 3--Architecture & Design

9th Grade - University

30 Qs

quiz-placeholder

Similar activities

Cloud Computing

Cloud Computing

University

25 Qs

OSI Model

OSI Model

12th Grade

25 Qs

Chapter 10: Customer Relationship Management

Chapter 10: Customer Relationship Management

University

25 Qs

STARTER Hardware, OS & Malware

STARTER Hardware, OS & Malware

10th - 11th Grade

25 Qs

6th Grade Chapter 2 Healthcare Systems Review

6th Grade Chapter 2 Healthcare Systems Review

6th - 12th Grade

30 Qs

CSC408_Chapter 3: Info Systems, Organisation and Strategy

CSC408_Chapter 3: Info Systems, Organisation and Strategy

University

30 Qs

Session IAP 10

Session IAP 10

University

25 Qs

Lean Six Sigma Management and Tools

Lean Six Sigma Management and Tools

University

25 Qs

Security + (SY0-601) Domain 3--Architecture & Design

Security + (SY0-601) Domain 3--Architecture & Design

Assessment

Quiz

Computers, Professional Development, Instructional Technology

9th Grade - University

Hard

Created by

Darrielle Flemming-Robinson

Used 14+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Using a combination of firewalls, intrusion detection systems, content filters, encryption, and auditing procedures in the organization for protection against intrusions is an example of which of the following?

Defense in depth

Infrastructure as a Service

Community cloud

Layered security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of control is a surveillance system?

logical control

technical control

physical control

management control

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are the most compelling reasons that secure configuration baselines have been established? (Select 3 answers.)

industry standards

organization requests

governmental mandates

regulatory bodies

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following devices is used to accept encrypted connections from users and then send the connection to the server unencrypted?

VPN

DMZ

DDoS mitigation appliance

SSL accelerators

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are setting up a switched network and want to group users by department. Which technology should you implement?

DMZ

VPN

VLAN

NAT

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An organization has a sensitive network that needs to have physically isolated machines. Which of the following practices would be used to meet this requirement?

air gap

VLAN

RAS

honeynet

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An organization is experiencing a large amount of electromagnetic interference (EMI). Which of the following is the best method to provide continuous operations?

extra shielding

A generator

A redundant electric connection

A RAID configuration

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?