100% Free Exams (No login or credit card required)

Section 1.2

Demonstrate your acquired knowledge about summarizing fundamental security concepts. This will demonstrate your proficiency for section 1.2 of the Security+ SY0-701 objectives.

1 / 25

Which security principle ensures that data cannot be modified by unauthorized entities?

2 / 25

Which physical security measure would be BEST to prevent unauthorized entry at the perimeter?

3 / 25

What type of access control uses electronically issued credentials to allow entry?

4 / 25

What physical security method provides continuous video recording of secure areas?

5 / 25

Which deception technology is a small piece of fake data that triggers alerts when used?

6 / 25

Which of the following is designed to resemble an entire fake network to attract and analyze attackers?

7 / 25

A decoy document labeled “passwords.txt” is placed on a file share to detect unauthorized access. What is this?

8 / 25

In the Zero Trust data plane, which element is the actor (e.g., user or system) attempting access?

9 / 25

What Zero Trust concept describes automatically adjusting user identity confidence levels?

10 / 25

Which Zero Trust component is responsible for executing policies, but not creating them?

11 / 25

Which model grants access based on job roles rather than individual permissions?

12 / 25

Which of the following best supports availability in the CIA triad?

13 / 25

A device that emits high-frequency sound waves to detect movement is what type of sensor?

14 / 25

What physical control is designed to prevent unauthorized tailgating into a building?

15 / 25

What sensor detects movement by measuring changes in heat signatures?

16 / 25

What is an example of a physical security control used to restrict vehicle-based attacks?

17 / 25

Which Zero Trust component enforces access based on the decision made by the policy engine?

18 / 25

What role does the Policy Engine play in Zero Trust?

19 / 25

In a Zero Trust architecture, which of the following is NOT assumed by default?

20 / 25

What is the primary goal of a gap analysis in cybersecurity?

21 / 25

Which of the following is a key component of accounting in AAA?

22 / 25

Which is an example of authenticating a system rather than a person?

23 / 25

In AAA, what function determines the specific actions a user is permitted to take after identity verification?

24 / 25

A user sends an email that is later denied. Which concept is used to ensure they cannot deny it?

25 / 25

Which component of the CIA triad ensures data is protected from unauthorized disclosure?

Your score is

The average score is 0%

0%