
CompTIA Security + : Architecture and Design
Authored by Briana Pruner
Computers, Professional Development
Professional Development
Used 35+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
64 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec ⢠5 pts
An organization prepares to deploy specialized medical systems that will remotely collect and monitor health information from each patient's home. The remote systems have limited hardware capabilities, and patients should not be required to purchase additional equipment or perform complex configurations. What should the organization do to ensure that PHI is protected?
Configure a VPN concentrator with remote device accounts
Deploy a NAT gateway and configure restrictive ACLs
Configure tunnel mode IP sec on organization routers
Deploy X.509 certificates on organization web servers
2.
MULTIPLE CHOICE QUESTION
30 sec ⢠5 pts
A security administrator is looking for a way to know when people approach any of several secure areas. The method must be active 24-hours a day. They want to keep recurring expenses related to the solution to a minimum.
What should the administrator use?
Proximity readers
A guard dog in each area
Video surveillance
A posted human guard in each are
3.
MULTIPLE CHOICE QUESTION
30 sec ⢠5 pts
An administrator sets up a VM for testing different versions of an application. The administrator wants to be able to return to the baseline state as quickly as possible between each test.
What should the administrator do?
Create a snapshot of the VM
Implement automatic change management
Configure a sandbox environment
Run a full backup of the host
4.
MULTIPLE CHOICE QUESTION
30 sec ⢠5 pts
An organization prepares to deploy specialized medical systems that will remotely collect and monitor health information from each patient's home. The remote systems have limited hardware capabilities, and patients should not be required to purchase additional equipment or perform complex configurations. What should the organization do to ensure that PHI is protected?
Deploy X.509 certificates on organization web servers.
Deploy a NAT gateway and configure restrictive ACLs.
Configure tunnel mode IPsec on organization routers
Configure a VPN concentrator with remote device accounts.
5.
MULTIPLE CHOICE QUESTION
30 sec ⢠5 pts
A security administrator is looking for a way to know when people approach any of several secure areas. The method must be active 24-hours a day. They want to keep recurring expenses related to the solution to a minimum.
What should the administrator use?
A guard dog in each area
A posted human guard in each area
Video surveillance
Proximity readers
6.
MULTIPLE CHOICE QUESTION
30 sec ⢠5 pts
An administrator sets up a VM for testing different versions of an application. The administrator wants to be able to return to the baseline state as quickly as possible between each test.
What should the administrator do?
Implement automatic change management
Create a snapshot of the VM
Run a full backup of the host
Configure a sandbox environment
7.
MULTIPLE CHOICE QUESTION
30 sec ⢠5 pts
Which server acts as a mirror of the real environment and is used by developers to test and finalize new software prior to rollout?
Staging
Proxy
Production
Development
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?