CASP+ CompTIA Advanced Security Practitioner Practice Tests. Nadean H. Tanner
Чтение книги онлайн.

Читать онлайн книгу CASP+ CompTIA Advanced Security Practitioner Practice Tests - Nadean H. Tanner страница 16

СКАЧАТЬ have a private T1 line installed for this access.You should secure a VPN concentrator for this task.You should use HTTPS.

      219 As the IT director of a nonprofit agency, you have been challenged at a local conference to provide technical cloud infrastructure that will be shared between several organizations like yours. Which is the best cloud partnership to form?Private cloudPublic cloudHybrid cloudCommunity cloud

      220 Your objectives and key results (OKRs) being measured for this quarter include realizing the benefits of a single-tenancy cloud architecture. Which one of these results is a benefit of a single-tenancy cloud service?Security and costReliability and scalingEase of restorationMaintenance

      221 With 80 percent of your enterprise in a VPC model, which of the following is not a key enabling technology?Fast WAN and automatic IP addressingHigh-performance hardwareInexpensive serversComplete control over process

      222 You have a new security policy that requires backing up critical data offsite. This data must be backed up hourly. Cost is important. What method are you most likely to deploy?File storageElectronic vaultingBlock storageObject storage

      223 Your current data storage solution has too many vulnerabilities that are proprietary to the manufacturer who created your storage devices. This, combined with a lack of encryption, is leading you to choose cloud storage for your database over on-premises storage. By choosing cloud storage, you will gain encryption of the data, but you will also bring in which attribute to your architecture?IdentityInfrastructureComplexityConfidentiality

      224 You want to implement a technology that will verify an email originated from a particular user and that the contents of the email were not altered. Of the answers provided, which technology provides such a function?Digital signatureSymmetric encryptionAsymmetric encryptionNonrepudiation

      225 Which of the following protocols could be used for exchanging information while implementing a variety of web services in your organization?SOAPHTTPSNMPASP

      226 Your CISO is concerned with the secure management of cryptographic keys used within the organization. She wants to use a system where the keys are broken into parts, and each part is encrypted and stored separately by contracted third parties. What is this process called?Key objectivesKey revenueKey escrowKey isolation

      227 Your VPN needs the strongest authentication possible. Your network consists of Microsoft servers. Which of the following protocols provide the most secure authentication?EAP-TLS with smart cardsSPAPCHAPLEAP

      228 You own a small training business with two classrooms. Your network consists of a firewall, an enterprise-class router, a 48-port switch, 1 printer, and 18 laptops in each classroom. The laptops are reimaged once a month with a golden patched image with up-to-date antivirus and antimalware. User authentication is two-factor with passwords and smart cards. The network is configured to use IPv4. You also have a wireless hotspot for students to connect their personal mobile devices. What could you improve on for a more resilient technical security posture?Enhanced TLS controlsStronger user authenticationSufficient physical controlsIPv6

      229 You are a network defender and are finding it difficult to keep up with the volume of network attacks. What can you leverage to help with early detection and response to these threats, especially new ones?Machine learningSIEMDevSecOpsSecurity as Code

      230 You need an encryption algorithm that offers easier key exchange and key management than symmetric offers. Which of the following is your best option?AsymmetricQuantumHashingScytale

      231 Your company wants to begin using biometrics for authentication. Which of the following are not biometrics that can be verified by a system to give an individual access?Facial recognitionIris recognitionRetina recognitionPIN recognition

      232 Laura is a proponent of using a distributed ledger to secure transactions. She wants to make it difficult to tamper with a single record because an attacker would need to change the block containing that record as well as those linked to it to avoid detection. Participants will have a private key assigned to their transactions that acts as a personal digital signature. What type of cryptographic system does Laura need to implement?Homomorphic encryptionSecure multiparty computationBlockchainDistributed consensus

      233 Felipe wants to use a protocol that allows a client to retrieve an element of a database without the owner of that database knowing which element was selected. If implemented securely, the client will only learn about the element they are querying for and nothing else preserving privacy. Which of the following provides the best solution?Strong private information retrievalSecure function evaluationPrivate function evaluationBig data

      234 Augmented reality (AR) advances are exciting, and cybersecurity is now dealing with a vast amount of complexity. The adoption of AR brings an expanding landscape of new cybersecurity vulnerabilities. Consumers and businesses are grappling with big data breaches, and implementing effective cybersecurity measures is a necessity for modern businesses. Which of these is not an urgent or relevant cybersecurity issue involving AR?Cloud structureInnovation outpacing secure developmentWearable exposureMicro/nano technology

      235 Three-dimensional printers include computers and run software that could be vulnerable to security issues that bad actors can take advantage of. To mitigate this issue, 3D printing vendors need to make secure coding and design a core part of their development process. Printer owners should also consider doing which of these first?Securely downloading plans for 3D printersHardening their devices when possible and considering the security of the 3D productionEncrypting SD cards used to hold all printing plansCleaning the laser that melts the powdered material into objects layer by layer

      236 Naomi wants to use passwordless authentication in her corporate network. Which of the following statements is not true?Linux supports passwordless SSH logins.Microsoft supports passwordless sign-in on Windows products and networks running Microsoft Active Directory.Passwordless authentication can be used only on mobile devices.Microsoft LDAP supports passwordless authentication through FIDO2 keys.

      237 You want your organization to benefit from artificial intelligence, but some in the application development department are confused about what AI actually is. Which statement is true?Artificial intelligence and machine learning are the same.Machine learning and deep learning are the same.Machine learning leads to deep learning, which leads to artificial intelligence.Artificial intelligence parses big data to make decisions.

      238 Terry is heading a project to implement a chatbot on the homepage of your insurance company to move away from live agents. What technology will he most likely employ?Natural language processingBiometricsVirtual realityDeep fake

      Конец ознакомительного фрагмента.

      Текст предоставлен ООО «ЛитРес».

      Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.

      Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.

/9j/4 СКАЧАТЬ