Security + (SY0-601) Domain 3--Architecture & Design

Security + (SY0-601) Domain 3--Architecture & Design

9th Grade - University

30 Qs

quiz-placeholder

Similar activities

CMAA Ch 1

CMAA Ch 1

11th - 12th Grade

26 Qs

Q1: Systems Integration II

Q1: Systems Integration II

University

25 Qs

Cloud Computing Quiz

Cloud Computing Quiz

University

30 Qs

STARTER Hardware, OS & Malware

STARTER Hardware, OS & Malware

10th - 11th Grade

25 Qs

Cloud Computing

Cloud Computing

University

25 Qs

IS-700.a: National Incident Management System (NIMS) An Introduc

IS-700.a: National Incident Management System (NIMS) An Introduc

11th - 12th Grade

26 Qs

IAS Semi Final Exam

IAS Semi Final Exam

University

25 Qs

Career Opportunities

Career Opportunities

10th - 12th Grade

30 Qs

Security + (SY0-601) Domain 3--Architecture & Design

Security + (SY0-601) Domain 3--Architecture & Design

Assessment

Quiz

Computers, Professional Development, Instructional Technology

9th Grade - University

Hard

Created by

Darrielle Flemming-Robinson

Used 14+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Using a combination of firewalls, intrusion detection systems, content filters, encryption, and auditing procedures in the organization for protection against intrusions is an example of which of the following?

Defense in depth

Infrastructure as a Service

Community cloud

Layered security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of control is a surveillance system?

logical control

technical control

physical control

management control

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are the most compelling reasons that secure configuration baselines have been established? (Select 3 answers.)

industry standards

organization requests

governmental mandates

regulatory bodies

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following devices is used to accept encrypted connections from users and then send the connection to the server unencrypted?

VPN

DMZ

DDoS mitigation appliance

SSL accelerators

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are setting up a switched network and want to group users by department. Which technology should you implement?

DMZ

VPN

VLAN

NAT

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An organization has a sensitive network that needs to have physically isolated machines. Which of the following practices would be used to meet this requirement?

air gap

VLAN

RAS

honeynet

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

An organization is experiencing a large amount of electromagnetic interference (EMI). Which of the following is the best method to provide continuous operations?

extra shielding

A generator

A redundant electric connection

A RAID configuration

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?