0% Section 2.5 Demonstrate your acquired knowledge about the purpose of mitigation techniques used to secure theenterprise. This will demonstrate your proficiency for section 2.5 of the Security+ SY0-701 objectives. 1 / 25 1) Which mitigation strategy focuses primarily on minimizing system vulnerabilities? Encryption Hardening Decommissioning Isolation 2 / 25 2) Identifying and controlling external connections to a network involves: Patching Segmentation Configuration enforcement Endpoint protection 3 / 25 3) What step ensures no sensitive data remains on decommissioned hardware? Encryption Monitoring Secure decommissioning Patch updating 4 / 25 4) A security policy restricting app installation only to those vetted by IT refers to: Hardening Application allow list Encryption Monitoring 5 / 25 5) Allowing traffic only from trusted sources at the host level uses: Host-based encryption Host-based firewall Patch isolation Port forwarding 6 / 25 6) Updating outdated encryption protocols falls under which mitigation technique? Monitoring Hardening Segmentation Decommissioning 7 / 25 7) Placing unused services into a separate security zone is an example of: Encryption Isolation Patching Monitoring 8 / 25 8) Removing unnecessary pre-installed software from endpoints supports: Isolation Hardening Encryption Monitoring 9 / 25 9) Which hardening practice involves replacing manufacturer-provided credentials? Patching Encryption Default password changes Network segmentation 10 / 25 10) One hardening method includes disabling unused: Accounts Ports and protocols VPN tunnels Subnets 11 / 25 11) A system that monitors and blocks known threats on individual machines is a: Host-based firewall Encryption service Host-based intrusion prevention system Monitoring tool 12 / 25 12) What host-based control restricts unauthorized inbound and outbound traffic? Host patching Host-based firewall System encryption Service monitoring 13 / 25 13) Installing anti-malware solutions on endpoints is an example of: Monitoring Installation of endpoint protection Isolation Encryption 14 / 25 14) Strengthening systems to reduce their vulnerability surface is known as: Hardening Encryption Monitoring Segmentation 15 / 25 15) Securely removing devices or systems from service is part of: Segmentation Decommissioning Monitoring Encryption 16 / 25 16) Enforcing system settings to align with security standards is called: Isolation Decommissioning Configuration enforcement Monitoring 17 / 25 17) Providing users only the rights necessary to perform their tasks is: Segmentation Encryption Monitoring Least privilege 18 / 25 18) Continuously reviewing system logs and activities is part of: Patching Isolation Monitoring Decommissioning 19 / 25 19) Encoding sensitive information to prevent unauthorized access involves: Hardening Encryption Isolation Monitoring 20 / 25 20) Regularly applying software updates addresses vulnerabilities by: Patching Segmentation Monitoring Hardening 21 / 25 21) Keeping systems separate to protect critical assets is referred to as: Segmentation Encryption Isolation Patching 22 / 25 22) Allowing only approved software to run on a system describes: Patch management Configuration control Application allow list Encryption enforcement 23 / 25 23) Limiting user actions based on roles and job functions enforces: Hardening Encryption Permissions Isolation 24 / 25 24) A set of rules used by routers and firewalls to permit or deny traffic is called: Encryption table Configuration file Access control list Isolation map 25 / 25 25) Dividing a network into smaller parts to limit lateral movement is known as: Isolation Segmentation Encryption Monitoring Your score isThe average score is 0% 0% Restart quiz Return to CompTia N+ 10-009 Objectives