CompTIA Security+ Testout Practice Quiz - Section 2

CompTIA Security+ Testout Practice Quiz - Section 2

12th Grade

33 Qs

quiz-placeholder

Similar activities

Networking, OSI, and Components Review

Networking, OSI, and Components Review

9th - 12th Grade

37 Qs

Cambridge Technical Unit 1 LO3

Cambridge Technical Unit 1 LO3

12th Grade

30 Qs

98-366 Lesson 2 OSI Model

98-366 Lesson 2 OSI Model

10th Grade - University

33 Qs

MLSA AZ-900 Study Group Final Quiz

MLSA AZ-900 Study Group Final Quiz

12th Grade

30 Qs

Intro to IT Ch 6 Quiz Review

Intro to IT Ch 6 Quiz Review

9th - 12th Grade

30 Qs

98-366 Lesson 7 WAN

98-366 Lesson 7 WAN

10th Grade - University

31 Qs

Internal and External Threats

Internal and External Threats

12th Grade

32 Qs

CompTIA Security+ Testout Practice Quiz - Section 2

CompTIA Security+ Testout Practice Quiz - Section 2

Assessment

Quiz

Computers

12th Grade

Easy

Created by

blackpanther300 blackpanther300

Used 1+ times

FREE Resource

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which Microsoft tool can be used to review a system's security configuration against recommended settings?

Microsoft Security Compliance Toolkit

Windows Defender

Microsoft Internet Explorer

Registry Editor

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following describes a configuration baseline?

A set of performance statistics that identifies normal operating performance

A list of common security settings that a group or all devices share

A collection of security settings that can be automatically applied to a device

The minimum services required for a server to function

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

DLP can be implemented as a software or hardware solution that analyzes traffic in an attempt to detect sensitive data that is being transmitted in violation of an organization's security policies. Which of the following DLP implementations analyzes traffic for data containing such things as financial documents, social security numbers, or key words used in proprietary intellectual property?

File-level DLP

Endpoint DLP

Network DLP

Cloud DLP

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following database encryption methods encrypts the entire database and all backups?

Bitlocker

Application-level

Column-level

Transparent Data Encryption (TDE)

5.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Which of the following protocols can TLS use for key exchange? (Select two.)

RSA

ECC

KEA

IKE

Diffie-Hellman

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

SSL (Secure Sockets Layer) operates at which layer of the OSI model?

Application

Presentation

Transport

Session

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Daily backups are completed at the ABD company location, and only a weekly backup is maintained at another network location. Which of the following disaster recovery strategies is ABD using?

Cold site

Hot site

Warm site

Hot spare

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?