Section 3.2 Demonstrate your acquired knowledge about applying security principles to secure enterpriseinfrastructure. This will demonstrate your proficiency for section 3.2 of the Security+ SY0-701 objectives. 1 / 25 Actively managing software and hardware settings to harden security relates to: Port balancing Secure enclaving Configuration enforcement VLAN segmentation 2 / 25 Which principle ensures minimal privileges granted to users and services? Inline architecture Least privilege enforcement Load balancing Layer 4 security 3 / 25 Combining security and networking into a unified cloud-based platform defines: SD-WAN Web application firewall SASE Logical segmentation 4 / 25 Simplifying WAN management with dynamic secure routing describes: VPN deployment Proxy chaining SD-WAN Inline IPS 5 / 25 Which tunneling method is most associated with securing IP packet flows? TLS HTTP/2 IPSec 802.1X 6 / 25 Remote tunneling protocols like TLS primarily ensure: Authentication Compression Encryption Data segmentation 7 / 25 Secure remote access connections commonly use: SD-WAN routers Load balancers VPNs WAFs 8 / 25 Which firewall type inspects and enforces security at the application layer? Layer 4 firewall Proxy appliance Layer 7 firewall Jump server 9 / 25 A device combining multiple security functions into a single appliance is: Proxy server UTM NGFW SD-WAN node 10 / 25 Protecting web-facing applications from attacks like SQLi is the job of: NGFW UTM appliance WAF Jump server 11 / 25 Which authentication framework works alongside 802.1X for secure login? IPSec EAP TLS SD-WAN tunnels 12 / 25 A security method requiring authentication before port activation is: Layer 7 firewall VLAN separation 802.1X enforcement Inline IDS 13 / 25 Devices placed to detect environmental or network changes are: Jump servers Sensors Proxy servers Layer 4 routers 14 / 25 Evenly distributing traffic loads across servers is the role of a: Proxy appliance Load balancer VPN concentrator Firewall 15 / 25 A network tool actively stopping detected threats operates as: IDS Passive monitor IPS Jump server 16 / 25 Devices forwarding client requests without revealing the client’s IP are: Jump servers Proxy servers IDS sensors Layer 7 firewalls 17 / 25 A server designed to manage connections between secured and unsecured networks is a: Load balancer IPS sensor Jump server VPN node 18 / 25 When a device is placed directly in the flow of network traffic, it is: Passive Inline Air-gapped Logical 19 / 25 Devices that monitor without altering traffic are considered: Inline Passive Fail-closed Jump servers 20 / 25 Which failure mode completely blocks data if a device fails? Fail-open Fail-closed Passive restart Resilient pathing 21 / 25 A security control allowing traffic during a failure is described as: Fail-closed Passive failover Fail-open Inline bypass 22 / 25 Prioritizing redundancy to maintain service during outages impacts: Device monitoring Connectivity resilience Firewall escalation Proxy balancing 23 / 25 Reducing entry points attackers can exploit refers to: Failure planning Attack surface minimization Secure tunneling Passive deployment 24 / 25 Separating assets into different areas to limit breaches defines: Connectivity planning Security zones Inline deployment Failure mode 25 / 25 Which placement minimizes a firewall’s effectiveness? Between internal LANs Between VLANs Behind core switches At the WAN edge Your score isThe average score is 0% 0% Restart quiz Return to CompTia N+ 10-009 Objectives