100% Free Exams (No login or credit card required)

0%

Section 4.1

Demonstrate your acquired knowledge about applying common security techniques to
computing resources. This will demonstrate your proficiency for section 4.1 of the Security+ SY0-701 objectives.

1 / 25

Why must embedded systems be carefully hardened?

2 / 25

Continuous observation of device activities describes:

3 / 25

Which environment isolates applications for safe testing?

4 / 25

Digitally signing code primarily assures:

5 / 25

Reviewing application source code for vulnerabilities is called:

6 / 25

Which technology ensures cookies cannot be easily exploited?

7 / 25

Verifying data from users before processing prevents:

8 / 25

What checks wireless credentials during user login?

9 / 25

Which ensures Wi-Fi authentication and encryption are strong?

10 / 25

Which system provides centralized AAA for Wi-Fi authentication?

11 / 25

What is the most current wireless encryption standard?

12 / 25

Cellular, Wi-Fi, and Bluetooth describe mobile:

13 / 25

Corporate-owned devices with personal use allowed define:

14 / 25

Which mobile model lets employees pick from approved devices?

15 / 25

Which mobile deployment allows personal device ownership?

16 / 25

MDM solutions primarily:

17 / 25

Which wireless tool shows areas of strong and weak signal?

18 / 25

Which helps determine optimal placement for wireless access points?

19 / 25

Hardening IoT devices typically involves:

20 / 25

A Real-Time Operating System (RTOS) requires:

21 / 25

ICS/SCADA systems require extra caution because they often:

22 / 25

What hardening technique is essential for routers?

23 / 25

Which task ensures a secure baseline remains current?

24 / 25

After setting a secure baseline, what comes next?

25 / 25

What is the first step in creating a secure system configuration?

Your score is

The average score is 0%

0%