
Security+ Domain 2: Architecture and Design Part 1
Authored by Tiffany Jones
Specialty
11th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
54 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is configuration management?
Managing default usernames and passwords
A process for maintaining computer systems, servers, and software in a desired, consistent state
The removal of secure configurations done by a malicious actor
None of the above
Answer explanation
Configuration management is the process of maintaining computer systems, servers, and software in a desired, consistent state.
2.
FILL IN THE BLANK QUESTION
45 sec • 2 pts
A ________ is an agreed upon description of product attributes at some point in time, serving as a basis for measuring change.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which baseline refers to the state of work products after approved requirements?
Allocated baseline
Developmental baseline
Functional baseline
Product baseline
Answer explanation
The correct choice is Allocated baseline because it refers to the state of work products after approved requirements are allocated to configuration items.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which baseline refers to the establishment of initial specifications?
Allocated baseline
Developmental baseline
Functional baseline
Product baseline
Answer explanation
The functional baseline refers to the establishment of initial specifications for the system's functions and capabilities.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is NOT part of the list of naming conventions for attributes?
Warranty expiration date
RFC Numbers
Status
Case Numbers
Answer explanation
The correct choice is 'Case Numbers' as it is NOT part of the list of naming conventions for attributes.
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is a hardware security module responsible for?
Onboard secure cryptographic key generation
Onboard secure cryptographic key storage
Key management
All of the above
Answer explanation
The hardware security module is responsible for onboard secure cryptographic key generation, storage, and key management, making 'All of the above' the correct choice.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Natural disasters are a form of an incident.
True
False
Answer explanation
Natural disasters are indeed a form of an incident, making the statement true.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?