0% Section 4.1 Demonstrate your acquired knowledge about applying common security techniques tocomputing resources. This will demonstrate your proficiency for section 4.1 of the Security+ SY0-701 objectives. 1 / 25 Why must embedded systems be carefully hardened? Their heat maps are extensive They cannot use VPN tunnels They are difficult to update They encrypt mobile data 2 / 25 Continuous observation of device activities describes: Sandboxing Monitoring Load balancing Static analysis 3 / 25 Which environment isolates applications for safe testing? Input validation Sandboxing Journaling Patch management 4 / 25 Digitally signing code primarily assures: Availability Obfuscation Integrity and authenticity Password expiration 5 / 25 Reviewing application source code for vulnerabilities is called: Failover Static code analysis Load balancing Connection method testing 6 / 25 Which technology ensures cookies cannot be easily exploited? Static analysis Data replication Secure cookies Site surveys 7 / 25 Verifying data from users before processing prevents: Journaling issues Input validation errors Device cloning Tabletop failures 8 / 25 What checks wireless credentials during user login? Site survey Authentication protocols Secure cookie scanning Static code validation 9 / 25 Which ensures Wi-Fi authentication and encryption are strong? Secure cookie Input validation Cryptographic protocols Load balancer 10 / 25 Which system provides centralized AAA for Wi-Fi authentication? OCSP SD-WAN SASE RADIUS 11 / 25 What is the most current wireless encryption standard? WPA2 WPA3 WEP SSL 12 / 25 Cellular, Wi-Fi, and Bluetooth describe mobile: Security protocols Connection methods Device deployment Input validation 13 / 25 Corporate-owned devices with personal use allowed define: BYOD COPE CYOD Heat mapping 14 / 25 Which mobile model lets employees pick from approved devices? BYOD COPE CYOD MDM 15 / 25 Which mobile deployment allows personal device ownership? COPE BYOD CYOD Site survey 16 / 25 MDM solutions primarily: Encrypt DNS traffic Manage IoT devices Enforce mobile policies Provide public keys 17 / 25 Which wireless tool shows areas of strong and weak signal? Tabletop exercise Failover processing Heat map Dynamic routing 18 / 25 Which helps determine optimal placement for wireless access points? Journaling Site survey Code signing Secure cookie setup 19 / 25 Hardening IoT devices typically involves: Load balancing Full disk journaling Changing default passwords Mobile device management 20 / 25 A Real-Time Operating System (RTOS) requires: Mobile device updates Extended Bluetooth range Immediate response time Load-balanced clustering 21 / 25 ICS/SCADA systems require extra caution because they often: Support Wi-Fi 6 Run legacy protocols Encrypt backups Disable Bluetooth 22 / 25 What hardening technique is essential for routers? Site survey Disable unused ports Update sandbox Cellular lockdown 23 / 25 Which task ensures a secure baseline remains current? Encryption Initial deployment Secure cookies Maintain baseline 24 / 25 After setting a secure baseline, what comes next? Conduct tabletop Deploy baseline Start journaling Conduct recovery 25 / 25 What is the first step in creating a secure system configuration? Update firmware Perform site survey Deploy hardening Establish secure baseline Your score isThe average score is 0% 0% Restart quiz Return to CompTia S+ SY0-701 Objectives