CompTIA Security+ Testout Practice Quiz - Section 2

CompTIA Security+ Testout Practice Quiz - Section 2

12th Grade

33 Qs

quiz-placeholder

Similar activities

BTEC DIT - A1 Modern Technologies

BTEC DIT - A1 Modern Technologies

10th - 12th Grade

32 Qs

Computer Storage and Adapter Card

Computer Storage and Adapter Card

5th - 12th Grade

30 Qs

Networking 3/4 Chapter 8 Test Review

Networking 3/4 Chapter 8 Test Review

9th - 12th Grade

33 Qs

TECH QUIZ

TECH QUIZ

9th - 12th Grade

30 Qs

Computer Networks (VCE Computing Chapter 3)

Computer Networks (VCE Computing Chapter 3)

10th - 12th Grade

30 Qs

AT204/205 - Protocols

AT204/205 - Protocols

10th Grade - University

28 Qs

ITE8 - Module 9 Terms

ITE8 - Module 9 Terms

12th Grade

31 Qs

Networking Basics

Networking Basics

9th - 12th Grade

32 Qs

CompTIA Security+ Testout Practice Quiz - Section 2

CompTIA Security+ Testout Practice Quiz - Section 2

Assessment

Quiz

Computers

12th Grade

Easy

Created by

blackpanther300 blackpanther300

Used 1+ times

FREE Resource

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which Microsoft tool can be used to review a system's security configuration against recommended settings?

Microsoft Security Compliance Toolkit

Windows Defender

Microsoft Internet Explorer

Registry Editor

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following describes a configuration baseline?

A set of performance statistics that identifies normal operating performance

A list of common security settings that a group or all devices share

A collection of security settings that can be automatically applied to a device

The minimum services required for a server to function

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

DLP can be implemented as a software or hardware solution that analyzes traffic in an attempt to detect sensitive data that is being transmitted in violation of an organization's security policies. Which of the following DLP implementations analyzes traffic for data containing such things as financial documents, social security numbers, or key words used in proprietary intellectual property?

File-level DLP

Endpoint DLP

Network DLP

Cloud DLP

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following database encryption methods encrypts the entire database and all backups?

Bitlocker

Application-level

Column-level

Transparent Data Encryption (TDE)

5.

MULTIPLE SELECT QUESTION

15 mins • 1 pt

Which of the following protocols can TLS use for key exchange? (Select two.)

RSA

ECC

KEA

IKE

Diffie-Hellman

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

SSL (Secure Sockets Layer) operates at which layer of the OSI model?

Application

Presentation

Transport

Session

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Daily backups are completed at the ABD company location, and only a weekly backup is maintained at another network location. Which of the following disaster recovery strategies is ABD using?

Cold site

Hot site

Warm site

Hot spare

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?