CompTIA Security+ Testout Practice Quiz - Section 2

CompTIA Security+ Testout Practice Quiz - Section 2

12th Grade

33 Qs

quiz-placeholder

Similar activities

Vocabulary #4 Quiz

Vocabulary #4 Quiz

11th Grade - University

30 Qs

SOAL LATIHAN ASJ Kelas XI

SOAL LATIHAN ASJ Kelas XI

12th Grade

30 Qs

ADMINISTRASI INFRASTRUKTUR JARINGAN - FIREWALL

ADMINISTRASI INFRASTRUKTUR JARINGAN - FIREWALL

12th Grade

30 Qs

REMIDI TUGAS SHARE HOSTING TAHAB 1 TANGGAL 25-2021 12 TKJ 2

REMIDI TUGAS SHARE HOSTING TAHAB 1 TANGGAL 25-2021 12 TKJ 2

12th Grade

30 Qs

MLSA AZ-900 Study Group Final Quiz

MLSA AZ-900 Study Group Final Quiz

12th Grade

30 Qs

ASJ XII TKJ

ASJ XII TKJ

1st - 12th Grade

30 Qs

COMPUTER SYSTEM SERVICING - PRE-TEST

COMPUTER SYSTEM SERVICING - PRE-TEST

11th - 12th Grade

35 Qs

AWS Sem 1 Modules 1-4

AWS Sem 1 Modules 1-4

12th Grade

31 Qs

CompTIA Security+ Testout Practice Quiz - Section 2

CompTIA Security+ Testout Practice Quiz - Section 2

Assessment

Quiz

Computers

12th Grade

Easy

Created by

blackpanther300 blackpanther300

Used 1+ times

FREE Resource

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which Microsoft tool can be used to review a system's security configuration against recommended settings?

Microsoft Security Compliance Toolkit

Windows Defender

Microsoft Internet Explorer

Registry Editor

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following describes a configuration baseline?

A set of performance statistics that identifies normal operating performance

A list of common security settings that a group or all devices share

A collection of security settings that can be automatically applied to a device

The minimum services required for a server to function

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

DLP can be implemented as a software or hardware solution that analyzes traffic in an attempt to detect sensitive data that is being transmitted in violation of an organization's security policies. Which of the following DLP implementations analyzes traffic for data containing such things as financial documents, social security numbers, or key words used in proprietary intellectual property?

File-level DLP

Endpoint DLP

Network DLP

Cloud DLP

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following database encryption methods encrypts the entire database and all backups?

Bitlocker

Application-level

Column-level

Transparent Data Encryption (TDE)

5.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Which of the following protocols can TLS use for key exchange? (Select two.)

RSA

ECC

KEA

IKE

Diffie-Hellman

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

SSL (Secure Sockets Layer) operates at which layer of the OSI model?

Application

Presentation

Transport

Session

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Daily backups are completed at the ABD company location, and only a weekly backup is maintained at another network location. Which of the following disaster recovery strategies is ABD using?

Cold site

Hot site

Warm site

Hot spare

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?