CompTIA SY0-501 Security+ Take Ten Challenge #1

Last modified on June 22nd, 2020 at 8:08 am

1-1: Which of the following would be the best way to segment two IP subnets that are physically located on the same switch?
Air gaps
VLANs
OS virtualization
Static routing
Firewall policies

Correct!

Wrong!

1-2: A company would like to build their own inventory management system, but they would prefer using a predefined set of application modules. Which cloud deployment model would facilitate this software development strategy?
IaaS
SaaS
Hybrid
PaaS
Community

Correct!

Wrong!

1-3: Which of these access control models is most associated with Windows Groups?
Role-based access control
Mandatory access control
File system security
Rule-based access control
Attribute-based access control

Correct!

Wrong!

1-4: Which of these best describes the Windows archive attribute?
A system administrator defines the attribute for all files and folders to restore
Users set the attribute when they create a new version of a file
A snapshot is created each time the attribute is set
The attribute is set when a file is modified
Any files with the attribute will have a secondary backup

Correct!

Wrong!

1-5: A developer has modified their source code to make it very difficult for anyone else to read and understand. Which of these would best describe this code?
Collision
Obfuscation
Encryption
Salted
Hashed

Correct!

Wrong!

1-6: Which of these activities would be categorized as passive reconnaissance?
Reading online forums
Scanning for open ports
Running DNS queries
Running ping sweeps
Performing OS fingerprinting

Correct!

Wrong!

1-7: Which of these security technologies can operate as a dissolvable agent?
Proxy
SIEM
NAC
Firewall
Mail gateway

Correct!

Wrong!

1-8: Which of these cloud computing characteristics is most associated with capturing the state of a cloud service or reverting to a previous state or configuration?
Automation
Templates
Orchestration
SaaS
Non-persistence

Correct!

Wrong!

1-9: A system administrator has been asked to install an application on a server that runs in the background with no user intervention. This server also supports many other applications at the same time. Which type of account would commonly be associated with this application?
Privileged
Generic
Shared
Service
User

Correct!

Wrong!

1-10: Which of the following would be most responsible for data accuracy, privacy, and security, associating sensitivity labels to data, and ensuring compliance with any applicable laws and standards?
Privacy officer
Data owner
System administrator
Data custodian
Data steward

Correct!

Wrong!

Share the quiz to show your results !

Subscribe to see your results

SY0-501 Take Ten Challenge #1

I got %%score%% of %%total%% right

%%description%%

%%description%%

Loading...



Take Ten Challenge #1 companion video with detailed answers:

Category: SY0-501 Take Ten Challenges

Comments are closed.

X