Security + (SY0-601) Domain 3--Architecture & Design

Security + (SY0-601) Domain 3--Architecture & Design

9th Grade - University

30 Qs

quiz-placeholder

Similar activities

Macromedia Flash

Macromedia Flash

8th Grade - Professional Development

26 Qs

ULANGAN HARIAN 2D

ULANGAN HARIAN 2D

11th Grade

25 Qs

informatika, Algoritma dan pemrograman

informatika, Algoritma dan pemrograman

11th Grade

25 Qs

Enkripsi Data kl 8 smt 1

Enkripsi Data kl 8 smt 1

11th Grade

25 Qs

Ôn Tập Học Kì I Lớp 4

Ôn Tập Học Kì I Lớp 4

4th Grade - University

35 Qs

Networks, Internet Communication and Protocols

Networks, Internet Communication and Protocols

9th Grade

25 Qs

Pemrograman Web - UNIB

Pemrograman Web - UNIB

University

25 Qs

Security + (SY0-601) Domain 3--Architecture & Design

Security + (SY0-601) Domain 3--Architecture & Design

Assessment

Quiz

Computers, Professional Development, Instructional Technology

9th Grade - University

Practice Problem

Hard

Created by

Darrielle Flemming-Robinson

Used 14+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Using a combination of firewalls, intrusion detection systems, content filters, encryption, and auditing procedures in the organization for protection against intrusions is an example of which of the following?

Defense in depth

Infrastructure as a Service

Community cloud

Layered security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of control is a surveillance system?

logical control

technical control

physical control

management control

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are the most compelling reasons that secure configuration baselines have been established? (Select 3 answers.)

industry standards

organization requests

governmental mandates

regulatory bodies

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following devices is used to accept encrypted connections from users and then send the connection to the server unencrypted?

VPN

DMZ

DDoS mitigation appliance

SSL accelerators

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are setting up a switched network and want to group users by department. Which technology should you implement?

DMZ

VPN

VLAN

NAT

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An organization has a sensitive network that needs to have physically isolated machines. Which of the following practices would be used to meet this requirement?

air gap

VLAN

RAS

honeynet

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An organization is experiencing a large amount of electromagnetic interference (EMI). Which of the following is the best method to provide continuous operations?

extra shielding

A generator

A redundant electric connection

A RAID configuration

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?