100% Free Exams (No login or credit card required)

Section 3.2

Demonstrate your acquired knowledge about applying security principles to secure enterprise
infrastructure. This will demonstrate your proficiency for section 3.2 of the Security+ SY0-701 objectives.

1 / 25

Actively managing software and hardware settings to harden security relates to:

2 / 25

Which principle ensures minimal privileges granted to users and services?

3 / 25

Combining security and networking into a unified cloud-based platform defines:

4 / 25

Simplifying WAN management with dynamic secure routing describes:

5 / 25

Which tunneling method is most associated with securing IP packet flows?

6 / 25

Remote tunneling protocols like TLS primarily ensure:

7 / 25

Secure remote access connections commonly use:

8 / 25

Which firewall type inspects and enforces security at the application layer?

9 / 25

A device combining multiple security functions into a single appliance is:

10 / 25

Protecting web-facing applications from attacks like SQLi is the job of:

11 / 25

Which authentication framework works alongside 802.1X for secure login?

12 / 25

A security method requiring authentication before port activation is:

13 / 25

Devices placed to detect environmental or network changes are:

14 / 25

Evenly distributing traffic loads across servers is the role of a:

15 / 25

A network tool actively stopping detected threats operates as:

16 / 25

Devices forwarding client requests without revealing the client’s IP are:

17 / 25

A server designed to manage connections between secured and unsecured networks is a:

18 / 25

When a device is placed directly in the flow of network traffic, it is:

19 / 25

Devices that monitor without altering traffic are considered:

20 / 25

Which failure mode completely blocks data if a device fails?

21 / 25

A security control allowing traffic during a failure is described as:

22 / 25

Prioritizing redundancy to maintain service during outages impacts:

23 / 25

Reducing entry points attackers can exploit refers to:

24 / 25

Separating assets into different areas to limit breaches defines:

25 / 25

Which placement minimizes a firewall’s effectiveness?

Your score is

The average score is 0%

0%