CompTIA Security+ STUDY GUIDE sample questions TEST 3

CompTIA Security+ STUDY GUIDE sample questions TEST 3

Professional Development

100 Qs

quiz-placeholder

Similar activities

Information Security Quiz

Information Security Quiz

Professional Development

100 Qs

march2024 monthly test

march2024 monthly test

Professional Development

100 Qs

D3 - SA and E

D3 - SA and E

Professional Development

99 Qs

CCNA Prep Simulation

CCNA Prep Simulation

Professional Development

103 Qs

march 2025

march 2025

Professional Development

100 Qs

Computer Fundamentals

Computer Fundamentals

Professional Development

101 Qs

CompTIA Net+ Practice (set A)

CompTIA Net+ Practice (set A)

Professional Development

100 Qs

IS202 - Midterm Sy2022 - 2023

IS202 - Midterm Sy2022 - 2023

Professional Development

100 Qs

CompTIA Security+ STUDY GUIDE sample questions TEST 3

CompTIA Security+ STUDY GUIDE sample questions TEST 3

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Michael Honold

Used 8+ times

FREE Resource

100 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kevin discovered that his web server was being overwhelmed by traffic, causing a CPU bottleneck. Using the interface offered by his cloud service provider, he added another CPU to the server. What term best describes Kevin's action?

Elasticity

Horizontal scaling

Vertical scaling

High availability

Answer explanation

Kevin's action of adding another CPU to his server is best described as vertical scaling, which involves increasing the capacity of a single server by adding resources like CPUs or memory, rather than adding more servers.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fran's organization uses a Type I hypervisor to implement an IaaS offering that it sells to customers. Which one of the following security controls is least applicable to this environment?

Customers must maintain security patches on guest operating systems.

The provider must maintain security patches on the hypervisor.

The provider must maintain security patches on the host operating system.

Customers must manage security groups to mediate network access to guest operating systems.

Answer explanation

The provider must maintain security patches on the host operating system is least applicable because in a Type I hypervisor environment, the host OS is typically abstracted away from customers, who focus on guest OS security.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In what cloud security model does the cloud service provider bear the most responsibility for implementing security controls?

IaaS

FaaS

PaaS

SaaS

Answer explanation

In the SaaS model, the cloud service provider is responsible for most security controls, including data protection and application security, while users focus on managing their data and user access.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Greg would like to find a reference document that describes how to map cloud security controls to different regulatory standards. What document would best assist with this task?

CSA CCM

NIST SP 500-292

ISO 27001

PCI DSS

Answer explanation

The CSA CCM (Cloud Security Alliance Cloud Controls Matrix) specifically provides a framework for mapping cloud security controls to various regulatory standards, making it the best choice for Greg's needs.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Wanda is responsible for a series of seismic sensors placed at remote locations. These sensors have low-bandwidth connections, and she would like to place computing power on the sensors to allow them to preprocess data before it is sent back to the cloud. What term best describes this approach?

Edge computing

Client-server computing

Fog computing

Thin client computing

Answer explanation

Wanda's approach of placing computing power on the sensors to preprocess data before sending it to the cloud is best described as edge computing. This term refers to processing data closer to the source, reducing latency and bandwidth usage.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following statements about cloud computing is incorrect?

Cloud computing offers ubiquitous, convenient access.

Cloud computing customers store data on hardware that is shared with other customers.

Cloud computing customers provision resources through the service provider's sales team.

Cloud computing resources are accessed over a network.

Answer explanation

The incorrect statement is that cloud computing customers provision resources through the service provider's sales team. In reality, customers typically provision resources directly through a self-service portal.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Helen designed a new payroll system that she offers to her customers. She hosts the payroll system in AWS and her customers access it through the web. What tier of cloud computing best describes Helen's service?

PaaS

SaaS

FaaS

IaaS

Answer explanation

Helen's payroll system is accessed via the web, making it a software application provided over the internet. This aligns with Software as a Service (SaaS), where users utilize software hosted on a cloud platform without managing the underlying infrastructure.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?