Section 4.5 Demonstrate your acquired knowledge about modifying enterprise capabilities to enhancesecurity. This will demonstrate your proficiency for section 4.5 of the Security+ SY0-701 objectives. 1 / 25 Which function of user behavior analytics (UBA) would identify account misuse from a valid user? Patch monitoring Token expiration Baseline deviation detection TLS inspection 2 / 25 What is a limitation of signature-based detection in IPS systems? Generates false positives Cannot detect zero-day threats Requires agent software Incompatible with UDP 3 / 25 Why is using HTTPS preferred over HTTP in a secure protocol stack? Improves SEO rankings Reduces web latency Provides encrypted transport Enables caching 4 / 25 What best describes the role of port selection in protocol security? Determines route path Limits exposure of services Rewrites firewall rules Guarantees QoS 5 / 25 A web filter denies access to websites not on an allow list. What is this approach called? DNS filtering Whitelist-based filtering Regex URL matching Behavioral proxy 6 / 25 Which system enforces access decisions based on device health, compliance, and identity? IDS NAC File hash monitor VPN concentrator 7 / 25 Which method is best for detecting insiders exfiltrating sensitive data via email? SNMP polling Data loss prevention Syslog rotation SIEM tuning 8 / 25 An endpoint solution identifies lateral movement across subnets. Which feature provides this insight? Packet shaper Behavioral analytics in EDR DNS resolver cache Port security 9 / 25 What does DKIM use to verify email authenticity? TLS certificates Digital signatures Email metadata Sender's IP address 10 / 25 What distinguishes group policies from local security policies in Windows environments? Less granular control Domain-wide enforcement Better performance Local-only execution 11 / 25 How does file integrity monitoring enhance endpoint protection? Encrypts file transfers Detects unauthorized file changes Blocks file downloads Limits disk space usage 12 / 25 Which feature of XDR enhances threat response compared to EDR alone? Centralized authentication Correlation across multiple security layers Static malware detection Hardware fingerprinting 13 / 25 Which secure protocol should replace FTP in a hardened environment? Telnet SFTP SMTP SNMPv1 14 / 25 What transport method is most secure when implementing a remote syslog server? UDP TCP with TLS HTTP FTP 15 / 25 What is the purpose of a Sender Policy Framework (SPF) record? Encrypt outbound messages Validate source mail servers Archive all email traffic Prevent DNS poisoning 16 / 25 Why is DMARC important in enterprise email systems? Protects against man-in-the-middle Encrypts content using S/MIME Helps prevent email spoofing Ensures server availability 17 / 25 What ensures only digitally signed software can run on SELinux-protected systems? Application hardening Code obfuscation Mandatory access control Data execution prevention 18 / 25 A content filter blocks pages by evaluating website reputation. What technique is this? Regex scanning Manual blacklisting SSL offloading Reputation-based filtering 19 / 25 What DNS feature helps reduce phishing attacks by preventing resolution of known malicious domains? SPF DNSSEC DNS filtering Zone transfer 20 / 25 Why might a centralized proxy be preferred over agent-based web filtering? Requires local installation Isolated from routing paths Easier to manage at scale Offers full OS integration 21 / 25 Which tool prevents users from accessing malicious or inappropriate websites based on URL categorization? Reverse proxy IDS Web filter SNMP trap 22 / 25 What firewall configuration allows limited access to public-facing servers without exposing internal assets? NAT loopback Demilitarized zone Port mirroring Transparent proxy 23 / 25 Which type of IDS detection method is most likely to identify unknown threats? Signature-based Heuristic Anomaly-based Trend-based 24 / 25 A firewall rule denying all traffic except for port 443 is an example of which principle? Port forwarding Implicit deny Service chaining Rule inheritance 25 / 25 What is the main security benefit of implementing a screened subnet? Simplifies host configuration Increases internal routing speed Segregates internal and external traffic layers Eliminates need for NAT Your score isThe average score is 0% 0% Restart quiz Return to CompTia S+ SY0-701 Objectives