Section 1.2 Demonstrate your acquired knowledge about summarizing fundamental security concepts. This will demonstrate your proficiency for section 1.2 of the Security+ SY0-701 objectives. 1 / 25 Which security principle ensures that data cannot be modified by unauthorized entities? Availability Integrity Confidentiality Authentication 2 / 25 Which physical security measure would be BEST to prevent unauthorized entry at the perimeter? Access badge Bollards Fencing Lighting 3 / 25 What type of access control uses electronically issued credentials to allow entry? Lighting system Access badge Fencing Pressure plate 4 / 25 What physical security method provides continuous video recording of secure areas? Pressure sensor Video surveillance Access badge Access control vestibule 5 / 25 Which deception technology is a small piece of fake data that triggers alerts when used? Honeynet Honeytoken Honeyfile Decoy keylogger 6 / 25 Which of the following is designed to resemble an entire fake network to attract and analyze attackers? Honeypot Honeynet Honeyfile Threat simulator 7 / 25 A decoy document labeled “passwords.txt” is placed on a file share to detect unauthorized access. What is this? Honeytoken Honeypot Honeyfile Honeynet 8 / 25 In the Zero Trust data plane, which element is the actor (e.g., user or system) attempting access? Policy Engine Policy Enforcement Point Subject/System Threat Detection 9 / 25 What Zero Trust concept describes automatically adjusting user identity confidence levels? Implicit trust zone Adaptive identity Authorization Subject tracking 10 / 25 Which Zero Trust component is responsible for executing policies, but not creating them? Policy Engine Policy Enforcement Point Policy Administrator Threat Scope 11 / 25 Which model grants access based on job roles rather than individual permissions? Mandatory access control Role-Based Access Control Discretionary access control Time-Based Access Control 12 / 25 Which of the following best supports availability in the CIA triad? Strong encryption Role-based access control Redundant systems Biometric authentication 13 / 25 A device that emits high-frequency sound waves to detect movement is what type of sensor? Microwave Infrared Ultrasonic Pressure 14 / 25 What physical control is designed to prevent unauthorized tailgating into a building? Access control vestibule Lighting Bollard Motion sensor 15 / 25 What sensor detects movement by measuring changes in heat signatures? Ultrasonic Infrared Microwave Pressure 16 / 25 What is an example of a physical security control used to restrict vehicle-based attacks? Bollards Access badge Infrared sensor Fencing 17 / 25 Which Zero Trust component enforces access based on the decision made by the policy engine? Subject System Policy Enforcement Point Policy Administrator Control Plane 18 / 25 What role does the Policy Engine play in Zero Trust? Applies decisions to data flow Makes access decisions based on policy and identity context Configures router ACLs Monitors audit logs 19 / 25 In a Zero Trust architecture, which of the following is NOT assumed by default? Continuous monitoring Dynamic access policies Implicit trust of internal users Identity verification 20 / 25 What is the primary goal of a gap analysis in cybersecurity? Encrypt user data Identify discrepancies between current and required security controls Validate firewall rules Monitor user activity 21 / 25 Which of the following is a key component of accounting in AAA? Validating user credentials Assigning user permissions Logging access attempts and actions Blocking unauthorized IPs 22 / 25 Which is an example of authenticating a system rather than a person? Username and password Certificate-based mutual TLS handshake Biometric scan One-time password (OTP) 23 / 25 In AAA, what function determines the specific actions a user is permitted to take after identity verification? Authentication Authorization Accounting Non-repudiation 24 / 25 A user sends an email that is later denied. Which concept is used to ensure they cannot deny it? Availability Confidentiality Non-repudiation Authorization 25 / 25 Which component of the CIA triad ensures data is protected from unauthorized disclosure? Integrity Confidentiality Availability Non-repudiation Your score isThe average score is 0% 0% Restart quiz Return to CompTia N+ 10-009 Objectives