Study sets, textbooks, questions
Upgrade to remove ads
Security + Mod 9 quiz
Terms in this set (20)
Data within the application message itself
Which of these is NOT used in scheduling a load balancer?
Stateful packet filtering
Emilie is reviewing a log file of a new firewall. She notes that the log indicates packets are being dropped for incoming packets for which the internal endpoint did not initially create the request. What kind of firewall is this?
Which of the following is NOT a firewall rule parameter?
Which of the following contains honeyfiles and fake telemetry?
it must be used on HTML5 compliant devices
Which of the following is NOT correct about L2TP?
In which of the following configurations are all the load balancers always active?
sofie needs to configure the VPN to preserve bandwidth. Which configuration would she choose?
Forward proxy server
Which device intercepts internal user requests and then processes those requests on behalf of the users?
Update Active Directory to indicate the device is vulnerable.
Which of the following is NOT a NAC option when it detects a vulnerable endpoint?
Maja has been asked to investigate DDoS mitigations. Which of the following should Maja consider?
t detects when a BPDU is received from an endpoint.
How does BPDU guard provide protection?
Which of these appliances provides the broadest protection by combining several security functions?
MAC address schema
Which of the following is not a basic configuration management tool?
A firewall that runs in the cloud
What is a virtual firewall?
It contains servers that are used only by internal network users.
Which statement regarding a demilitarized zone (DMZ) is NOT true?
Which firewall rule action implicitly denies all other traffic unless explicitly allowed?
Hanna has received a request for a data set of actual data for testing a new app that is being developed. She does not want the sensitive elements of the data to be exposed. What technology should she use?
Which of the following functions does a network hardware security module NOT perform?
Which type of monitoring methodology looks for statistical deviations from a baseline?
Leah is researching information on firewalls. She needs a firewall that allows for more generic statements instead of creating specific rules. What type of firewall should Leah consider purchasing that supports her need?
Sets found in the same folder
Security+ Post Assessment
CompTIA Module 1-4 Review Questions
Other sets by this creator
Test Out Security Domain 3
Test Out security Domain 5
TestOut Security Domain 4
Test out security Domain 2
Other Quizlet sets
environmental science test 1
quiz 4- periodontal diseases
TX GOV RQ.3
Test 1 (week 1-4)