Which of the following terms describes the process of identifying differences between an organization's current security posture and its desired security posture?
CompTIA Security+ Certification Exam SY0-701 Practice Test 2

Quiz
•
Computers
•
Professional Development
•
Hard
Benjamin Taylor
Used 1+ times
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tabletop exercise
Gap analysis
Security awareness training
Risk assessment
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The term 'Zero Trust security' refers to a cybersecurity model that eliminates implicit trust from networks and requires all users and devices to be continuously verified before being granted access to resources. The implementation of the Zero Trust security involves two distinct components: a Data Plane, responsible for defining and managing security policies, and a Control Plane, responsible for enforcing the security policies established by the Data Plane.
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the answers listed below refers to a Zero Trust Control Plane security approach that takes into account user identity, device security, network conditions, and other contextual information to enable dynamic access decisions?
Implicit trust
Monitoring and logging
Adaptive identity
Microsegmentation
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are the key components of the Zero Trust Control Plane's Policy Decision Point (PDP)? (Select 2 answers)
Policy Engine (PE)
Monitoring and logging
Policy Enforcement Point (PEP)
Microsegmentation
Policy Administrator (PA)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the Zero Trust security architecture, the Policy Enforcement Point (PEP) is a Data Plane component that enforces the security policies defined at the Control Plane by the Policy Decision Point (PDP).
True
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An access control vestibule (a.k.a. mantrap) is a physical security access control system used to prevent unauthorized users from gaining access to restricted areas. An example mantrap could be a two-door entrance point connected to a guard station wherein a person entering from the outside remains locked inside until he/she provides authentication token required to unlock the inner door.
True
False
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following statements about honeypots are true? (Select 2 answers)
Honeypots are always part of a honeynet
Honeypots mimic real systems to attract cyber attackers
Honeypots are a type of anti-malware solution
Honeypots contain apparent vulnerabilities that are closely monitored by a security team
Honeypots are used to launch attacks on cyber attackers
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
MTA: 98-367 Security Part 1

Quiz
•
KG - Professional Dev...
23 questions
ICEBERG_Assessment_Pre

Quiz
•
University - Professi...
20 questions
Sec+ | 1.4 Encryptions | 701

Quiz
•
Professional Development
20 questions
ITF+ Ch10, Security Best Practices

Quiz
•
Professional Development
25 questions
CompTIA A+ Certification Practice Test 11

Quiz
•
Professional Development
28 questions
A+ - 16A - Explain Attacks, Threats, and Vulnerabilities

Quiz
•
Professional Development
25 questions
A+ - 14C - Configure Windows Security Settings

Quiz
•
Professional Development
20 questions
ITF+ Ch9, Security Concepts & Threats

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade