Search Header Logo

CompTIA Security + : Architecture and Design

Authored by Briana Pruner

Computers, Professional Development

Professional Development

Used 35+ times

CompTIA Security + : Architecture and Design
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

64 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

An organization prepares to deploy specialized medical systems that will remotely collect and monitor health information from each patient's home. The remote systems have limited hardware capabilities, and patients should not be required to purchase additional equipment or perform complex configurations. What should the organization do to ensure that PHI is protected?

Configure a VPN concentrator with remote device accounts

Deploy a NAT gateway and configure restrictive ACLs

Configure tunnel mode IP sec on organization routers

Deploy X.509 certificates on organization web servers

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A security administrator is looking for a way to know when people approach any of several secure areas. The method must be active 24-hours a day. They want to keep recurring expenses related to the solution to a minimum.

What should the administrator use?

Proximity readers

A guard dog in each area

Video surveillance

A posted human guard in each are

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

An administrator sets up a VM for testing different versions of an application. The administrator wants to be able to return to the baseline state as quickly as possible between each test.

What should the administrator do?

Create a snapshot of the VM

Implement automatic change management

Configure a sandbox environment

Run a full backup of the host

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

An organization prepares to deploy specialized medical systems that will remotely collect and monitor health information from each patient's home. The remote systems have limited hardware capabilities, and patients should not be required to purchase additional equipment or perform complex configurations. What should the organization do to ensure that PHI is protected?

Deploy X.509 certificates on organization web servers.

Deploy a NAT gateway and configure restrictive ACLs.

Configure tunnel mode IPsec on organization routers

Configure a VPN concentrator with remote device accounts.

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

A security administrator is looking for a way to know when people approach any of several secure areas. The method must be active 24-hours a day. They want to keep recurring expenses related to the solution to a minimum.

What should the administrator use?

A guard dog in each area

A posted human guard in each area

Video surveillance

Proximity readers

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

An administrator sets up a VM for testing different versions of an application. The administrator wants to be able to return to the baseline state as quickly as possible between each test.

What should the administrator do?

Implement automatic change management

Create a snapshot of the VM

Run a full backup of the host

Configure a sandbox environment

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which server acts as a mirror of the real environment and is used by developers to test and finalize new software prior to rollout?

Staging

Proxy

Production

Development

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?