
Comptia Security+ SYO-601 Practice Quiz #6
Authored by Darrielle Flemming-Robinson
Instructional Technology
9th - 12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If your company has to introduce a new enterprise mobility strategy for all users. With the strategy,
employees will have to choose a mobile device from a company-approved list. Which of these is the
appropriate deployment model for the enterprise to use?
VDI
CYOD
COPE
BYOD
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have with you, numerous computers using the NTLM authentication protocol for client authentication. User passwords with at least 16 characters are required by the Network policy. Identify the hash algorithm used for password authentication?
MD5
RIPEMD
LMhash
SHA
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In an organization, users are allowed to use company-issued tablets to access the network, with the permission to install only approved apps on the devices. What MDM feature would provide functionality meeting this requirement?
Application control
Inventory control
Asset tracking
Inventory control
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a company, users are now allowed to use mobile devices on the company network. A screen appears when users are connected to the company Wi-Fi, defining terms of use, and users have to click to acknowledge the agreement. The user is only allowed to connect to the network If he agrees to the terms by clicking Yes. This is an example of what?
User acceptance
Acceptable use policy
Authentication
End user license agreement
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A Layer 2 switch is used by an organization to segment a network with a separate network segment assigned of each department. The conference room contains a wireless AP. What should you use if you are to make sure a user can only access resources in their own VLAN upon connecting his laptop computer to the wireless AP in the conference room?
VLAN tagging
802.1 x
ACLs
Subnetting
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Using the agile method for application development, what are the two advantages you can get? (opt any two)
Team use continuous integration techniques.
Project managers play a key role at all stages and assign tasks.
Each programmer is responsible.
Project are change oriented and decisions are made by the whole team.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Some gaps have been highlighted upon completing a security audit of a company. Recommendations from the report suggest upgrading some network components. The following requirements have been provided by the company: A security device must be implemented consolidating various functions to protect the network, malicious websites to be filtered, and SPAM messages to be stopped. Implement A tool using real-time and historical analysis to be implemented to identify malware and security incidents. Which of the following set of devices and tools is BEST suited for that purpose?
Firewall with STEM
IPS with STEM
UTM with STEM
Firewall with Syslog
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?