Comptia Security+ SYO-601 Practice Quiz #6

Comptia Security+ SYO-601 Practice Quiz #6

9th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

soal pts pjok semester ganjil 2020

soal pts pjok semester ganjil 2020

10th Grade

25 Qs

HTML & CSS

HTML & CSS

12th Grade

25 Qs

Uji Pretest - DKTEI - Gambar Elektronika

Uji Pretest - DKTEI - Gambar Elektronika

9th - 12th Grade

25 Qs

E/SA3/UN VIAJE ELECTRIZANTE A

E/SA3/UN VIAJE ELECTRIZANTE A

12th Grade

25 Qs

IoT PARTE 1

IoT PARTE 1

12th Grade

25 Qs

Repassam. Un projecte tecnològic

Repassam. Un projecte tecnològic

7th - 10th Grade

25 Qs

EmTech Q1 Reviewer

EmTech Q1 Reviewer

11th Grade

35 Qs

TIN 7_KT GIỮA KỲ 2  2022

TIN 7_KT GIỮA KỲ 2 2022

1st - 12th Grade

28 Qs

Comptia Security+ SYO-601 Practice Quiz #6

Comptia Security+ SYO-601 Practice Quiz #6

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Medium

Created by

Darrielle Flemming-Robinson

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If your company has to introduce a new enterprise mobility strategy for all users. With the strategy,

employees will have to choose a mobile device from a company-approved list. Which of these is the

appropriate deployment model for the enterprise to use?

VDI

CYOD

COPE

BYOD

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have with you, numerous computers using the NTLM authentication protocol for client authentication. User passwords with at least 16 characters are required by the Network policy. Identify the hash algorithm used for password authentication?

MD5

RIPEMD

LMhash

SHA

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In an organization, users are allowed to use company-issued tablets to access the network, with the permission to install only approved apps on the devices. What MDM feature would provide functionality meeting this requirement?

Application control

Inventory control

Asset tracking

Inventory control

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a company, users are now allowed to use mobile devices on the company network. A screen appears when users are connected to the company Wi-Fi, defining terms of use, and users have to click to acknowledge the agreement. The user is only allowed to connect to the network If he agrees to the terms by clicking Yes. This is an example of what?

User acceptance

Acceptable use policy

Authentication

End user license agreement

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Layer 2 switch is used by an organization to segment a network with a separate network segment assigned of each department. The conference room contains a wireless AP. What should you use if you are to make sure a user can only access resources in their own VLAN upon connecting his laptop computer to the wireless AP in the conference room?

VLAN tagging

802.1 x

ACLs

Subnetting

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Using the agile method for application development, what are the two advantages you can get? (opt any two)

Team use continuous integration techniques.

Project managers play a key role at all stages and assign tasks.

Each programmer is responsible.

Project are change oriented and decisions are made by the whole team.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Some gaps have been highlighted upon completing a security audit of a company. Recommendations from the report suggest upgrading some network components. The following requirements have been provided by the company: A security device must be implemented consolidating various functions to protect the network, malicious websites to be filtered, and SPAM messages to be stopped. Implement A tool using real-time and historical analysis to be implemented to identify malware and security incidents. Which of the following set of devices and tools is BEST suited for that purpose?

Firewall with STEM

IPS with STEM

UTM with STEM

Firewall with Syslog

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Instructional Technology