
CompTIA Security+ Certification SY0-601: The Total Course - Physical Security
Interactive Video
•
Information Technology (IT), Architecture, Other
•
University
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Read more
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is physical security considered an important aspect of cybersecurity?
Because it only involves securing software applications.
Because physical access to hardware can lead to easier data breaches.
Because it only deals with securing data in the cloud.
Because it is unrelated to cybersecurity.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a hardware keylogger used for?
To encrypt data on a hard drive.
To enhance the speed of a computer.
To capture keystrokes from a keyboard without the user's knowledge.
To protect data from unauthorized access.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What role do robot sentries play in physical security?
They are responsible for managing network traffic.
They are used to encrypt sensitive information.
They act as security guards, monitoring properties.
They are used to store data securely.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is the location of a cloud provider's data center kept confidential?
To avoid paying taxes.
To prevent unauthorized physical access to sensitive data.
To reduce the cost of operations.
To increase the speed of data processing.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a man trap in server room security?
To monitor network traffic.
To provide a backup power source.
To prevent tailgating by ensuring only one person enters at a time.
To trap unauthorized personnel inside the server room.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an air-gapped network?
A network that is only used for cloud computing.
A network that is isolated with no physical or wireless connections to other networks.
A network that uses air pressure to transmit data.
A network that is connected to the internet.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can an air-gapped network be compromised?
By using a password manager.
By using a strong firewall.
By connecting it to the internet.
By introducing an infected USB device.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?