100% Free Exams (No login or credit card required)

Section 4.5

Demonstrate your acquired knowledge about modifying enterprise capabilities to enhance
security. This will demonstrate your proficiency for section 4.5 of the Security+ SY0-701 objectives.

1 / 25

Which function of user behavior analytics (UBA) would identify account misuse from a valid user?

2 / 25

What is a limitation of signature-based detection in IPS systems?

3 / 25

Why is using HTTPS preferred over HTTP in a secure protocol stack?

4 / 25

What best describes the role of port selection in protocol security?

5 / 25

A web filter denies access to websites not on an allow list. What is this approach called?

6 / 25

Which system enforces access decisions based on device health, compliance, and identity?

7 / 25

Which method is best for detecting insiders exfiltrating sensitive data via email?

8 / 25

An endpoint solution identifies lateral movement across subnets. Which feature provides this insight?

9 / 25

What does DKIM use to verify email authenticity?

10 / 25

What distinguishes group policies from local security policies in Windows environments?

11 / 25

How does file integrity monitoring enhance endpoint protection?

12 / 25

Which feature of XDR enhances threat response compared to EDR alone?

13 / 25

Which secure protocol should replace FTP in a hardened environment?

14 / 25

What transport method is most secure when implementing a remote syslog server?

15 / 25

What is the purpose of a Sender Policy Framework (SPF) record?

16 / 25

Why is DMARC important in enterprise email systems?

17 / 25

What ensures only digitally signed software can run on SELinux-protected systems?

18 / 25

A content filter blocks pages by evaluating website reputation. What technique is this?

19 / 25

What DNS feature helps reduce phishing attacks by preventing resolution of known malicious domains?

20 / 25

Why might a centralized proxy be preferred over agent-based web filtering?

21 / 25

Which tool prevents users from accessing malicious or inappropriate websites based on URL categorization?

22 / 25

What firewall configuration allows limited access to public-facing servers without exposing internal assets?

23 / 25

Which type of IDS detection method is most likely to identify unknown threats?

24 / 25

A firewall rule denying all traffic except for port 443 is an example of which principle?

25 / 25

What is the main security benefit of implementing a screened subnet?

Your score is

The average score is 0%

0%