CompTIA Security+ Certification Exam SY0-701 Practice Test 2

CompTIA Security+ Certification Exam SY0-701 Practice Test 2

Professional Development

25 Qs

quiz-placeholder

Similar activities

PHP TEST 2

PHP TEST 2

1st Grade - Professional Development

20 Qs

Ujian Pertengahan Semester Pelajaran ''AIJ''

Ujian Pertengahan Semester Pelajaran ''AIJ''

Professional Development

20 Qs

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

ULANGAN 1 TLJ KELAS XII

ULANGAN 1 TLJ KELAS XII

KG - Professional Development

20 Qs

Fibra Óptica, Medios Inalámbricos, Cableado Estructurado

Fibra Óptica, Medios Inalámbricos, Cableado Estructurado

Professional Development

20 Qs

2k16_Embedded_Module_3

2k16_Embedded_Module_3

Professional Development

20 Qs

DI (EM24) - Diseño de Contenidos (T8)

DI (EM24) - Diseño de Contenidos (T8)

University - Professional Development

20 Qs

Evaluacion Continua 2

Evaluacion Continua 2

Professional Development

20 Qs

CompTIA Security+ Certification Exam SY0-701 Practice Test 2

CompTIA Security+ Certification Exam SY0-701 Practice Test 2

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Benjamin Taylor

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms describes the process of identifying differences between an organization's current security posture and its desired security posture?

Tabletop exercise

Gap analysis

Security awareness training

Risk assessment

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term 'Zero Trust security' refers to a cybersecurity model that eliminates implicit trust from networks and requires all users and devices to be continuously verified before being granted access to resources. The implementation of the Zero Trust security involves two distinct components: a Data Plane, responsible for defining and managing security policies, and a Control Plane, responsible for enforcing the security policies established by the Data Plane.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the answers listed below refers to a Zero Trust Control Plane security approach that takes into account user identity, device security, network conditions, and other contextual information to enable dynamic access decisions?

Implicit trust

Monitoring and logging

Adaptive identity

Microsegmentation

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are the key components of the Zero Trust Control Plane's Policy Decision Point (PDP)? (Select 2 answers)

Policy Engine (PE)

Monitoring and logging

Policy Enforcement Point (PEP)

Microsegmentation

Policy Administrator (PA)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the Zero Trust security architecture, the Policy Enforcement Point (PEP) is a Data Plane component that enforces the security policies defined at the Control Plane by the Policy Decision Point (PDP).

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An access control vestibule (a.k.a. mantrap) is a physical security access control system used to prevent unauthorized users from gaining access to restricted areas. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering from the outside remains locked inside until he/she provides authentication token required to unlock the inner door.

True

False

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following statements about honeypots are true? (Select 2 answers)

Honeypots are always part of a honeynet

Honeypots mimic real systems to attract cyber attackers

Honeypots are a type of anti-malware solution

Honeypots contain apparent vulnerabilities that are closely monitored by a security team

Honeypots are used to launch attacks on cyber attackers

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?