Chapter 05 – Security Hosts and Data

CompTIA Security+ (SY0-701) – Chapter 5

1 / 171

What types of resources can access virtual desktop infrastructures (VDIs)?

2 / 171

How does an organization typically protect the confidentiality of its data?

3 / 171

Which of the following is not a common constraint of an embedded system?

4 / 171

What is the main difference between Wi-Fi Direct and a wireless ad hoc network?

5 / 171

Which of the following is NOT true about Change Management Policy in IT?

6 / 171

Which of the following are NOT common considerations developers should address to ensure APIs aren’t vulnerable to common exploits?

7 / 171

What is a characteristic of a non-persistent virtual desktop?

8 / 171

What is the role of integrity measurements in baseline deviations?

9 / 171

What is the primary purpose of taking a snapshot of a virtual machine?

10 / 171

How is replication beneficial for a virtual machine?

11 / 171

What does a customer have to do with a server provided via Infrastructure as a Service (IaaS)?

12 / 171

Which of the following best describes the main point regarding ’Implementing Secure Systems?’

13 / 171

What does high availability across zones indicate in the context of cloud security controls?

14 / 171

Which of the following deployment models for mobile devices allows employees to use their corporate-owned devices for personal activities?

15 / 171

What does the ’remote wipe’ feature in Mobile Device Management (MDM) do?

16 / 171

What is the purpose of Endpoint Detection and Response (EDR) tools in Endpoint Security?

17 / 171

Why is it often not possible to patch embedded systems?

18 / 171

What is a Trusted Platform Module (TPM)?

19 / 171

Why do embedded systems often have weak defaults?

20 / 171

What are two important benefits of using master images for baseline configurations?

21 / 171

What method of authentication discussed in chapter 2 does mobile device management (MDM) support?

22 / 171

Which of the following statements best describes Rich Communication Services (RCS)?

23 / 171

What are the functions of a network-based Data Loss Prevention (DLP) system in preventing data exfiltration?

24 / 171

What does dynamic resource allocation in cloud-based resources mean?

25 / 171

What is the primary difference between the traditional Corporate-owned model and the Corporate-owned, personally enabled (COPE) model?

26 / 171

Which among the following embedded systems does not use an operating system, but uses firmware for functionality?

27 / 171

Which of the following represents a potential risk associated with hardware features on mobile devices, and how MDM tools can be tailored to mitigate such risks?

28 / 171

What is the function of the Permissive mode in the Security-Enhanced Linux (SELinux) policy?

29 / 171

What are some common uses of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems in the context of Energy?

30 / 171

Which of the following features of Mobile Device Management (MDM) can be useful if a mobile phone is lost or stolen?

31 / 171

What is Bluetooth commonly used with in the context of mobile devices?

32 / 171

What function does geofencing perform in the context of mobile device security?

33 / 171

What is a hybrid cloud in the context of cloud deployment models?

34 / 171

According to NIST SP 800-124, which of the following characteristics are NOT found in mobile devices?

35 / 171

What does Infrastructure as code refer to?

36 / 171

What is the primary reason for an organization to potentially block the ability to switch carriers on a COPE device?

37 / 171

What does the term ’Rights Management’ primarily refer to?

38 / 171

What can a cloud-based DLP policy be configured to do after detecting sensitive information?

39 / 171

What is a characteristic of Container Virtualization?

40 / 171

What does resource policies control in a cloud-based system?

41 / 171

What type of wireless technology is Infrared and how is it used?

42 / 171

Which of the following is not considered a constraint of embedded systems based on the provided text?

43 / 171

Which cloud deployment model is only available for one specific organization?

44 / 171

Which communication method has a significantly lower range compared to 4G and can be blocked by physical barriers such as trees, walls, and glass?

45 / 171

What is the role of a Cloud Access Security Broker (CASB)?

46 / 171

What is the process of ’Remediation’ in the context of secure baselines?

47 / 171

What does the term ’jailbreaking’ refer to?

48 / 171

What are the primary issues associated with VM sprawl?

49 / 171

What are two benefits of deploying systems using a master image?

50 / 171

What is the main difference between COPE (corporate-owned, personally enabled) and CYOD (choose your own device) deployment models?

51 / 171

Which of the following correctly describes a USB (Universal Serial Bus) in the context of mobile devices?

52 / 171

What is the purpose of a CSP integrating auditing methods into the cloud-based resources?

53 / 171

What is a System on a Chip (SoC) in the context of CompTIA Security+?

54 / 171

What distinguishes a microservices API from a web services-based API in terms of its business tie-in?

55 / 171

What is the potential security threat associated with GPS tagging?

56 / 171

What is the main concept of Platform as a Service (PaaS)?

57 / 171

What is the function of security groups within cloud-based resources according to CompTIA?

58 / 171

What are the three steps in the use of secure baselines in organizations?

59 / 171

What is the primary difference between edge computing and fog computing based on the given text?

60 / 171

What distinguishes the Cloud Security Alliance’s (CSA) Cloud Controls Matrix (CCM) from SP-800-53 Revision 5?

61 / 171

Which of the following methods is commonly used as a payment gateway allowing you to make payments simply by waving your phone in front of a reader at a retailer?

62 / 171

Which of the following statements regarding SEAndroid security model is NOT correct?

63 / 171

What does the term ’Guest’ refer to in the context of VMs and virtualization?

64 / 171

What is the role of a transit gateway in a cloud-based network?

65 / 171

Why might designers skip authentication when designing embedded systems?

66 / 171

Which of the following is a method to distribute updated version of firmware on Android devices?

67 / 171

What is a primary benefit of utilizing an off-premises cloud service provider (CSP) solution?

68 / 171

What does it mean when a system or service is said to have high availability?

69 / 171

What is the characteristic of Zigbee as a communication protocol?

70 / 171

What is the process of copying an application package in the Application Packet Kit (APK) format to the device and then activating it?

71 / 171

Which of the following does not accurately describe a constraint faced by embedded systems?

72 / 171

Which of the following is a common use of the supervisory control and data acquisition (SCADA) systems and ICS?

73 / 171

What is the difference between public and private subnets in a cloud-based network?

74 / 171

What is likely to happen if the cost of an embedded system device is minimized by the manufacturer?

75 / 171

What are the consequences of implied trust in embedded systems?

76 / 171

What is monitored by SCADA systems in water treatment facilities?

77 / 171

Which connection method is typically used by smartphones and tablets to connect to a high-speed digital transfer service that is provided by a cellular network?

78 / 171

What is meant by ’hardware root of trust’ in the context of TPM?

79 / 171

What network security mechanism is typically used to block unwanted traffic from reaching a SCADA system or an ICS, that is connected to the corporate network?

80 / 171

What does the use of a USB data blocker in the context of a security policy generally serve to prevent?

81 / 171

What are the primary risks associated with text messaging services such as Short Message Service (SMS) and Multimedia Messaging Service (MMS)?

82 / 171

Management within an organization might want to limit a mobile device’s connections to prevent certain security threats. What could be a potential threat if employees use tethering within the organization?

83 / 171

What is a private cloud?

84 / 171

Which of the following limitations of embedded systems could potentially lead to security vulnerabilities?

85 / 171

Which type of cloud deployment model is provided by third-party companies and is available to anyone willing to pay for the services?

86 / 171

What are the shared responsibilities between a cloud service provider and a customer in IaaS, PaaS, SaaS models?

87 / 171

What is the primary difference between a non-Opal-compliant SED and an Opal-compliant SED?

88 / 171

What does ’Range’ constraint in embedded systems refer to?

89 / 171

What is the term for the process of modifying an Android device to give full administrative access to a user?

90 / 171

Which of the following is NOT true about Software as a Service (SaaS)?

91 / 171

Which of the following is NOT a way in which IoT (Internet of Things) technology is commonly used?

92 / 171

What is the purpose of storage segmentation in mobile device management?

93 / 171

What is a key difference in traffic routing between a software-defined network (SDN) and traditional hardware routers?

94 / 171

What is the purpose of a Virtual Private Cloud (VPC) endpoint within a virtual network?

95 / 171

What does ’instance awareness’ in cloud security controls refer to?

96 / 171

What does MDM tools do when the organization owns the device?

97 / 171

Which of the following is a key function of a next-generation Secure Web Gateway (SWG)?

98 / 171

What is the purpose of content management in mobile device management (MDM)?

99 / 171

What are the main characteristics of an on-premises cloud solution according to the text?

100 / 171

What is an embedded system as defined by the CompTIA Security+ objectives?

101 / 171

What is the difference between the function of FPGA and Arduino in terms of configurability?

102 / 171

What is the main benefit of using cloud computing for heavily utilized systems and networks?

103 / 171

What kind of memory does the Arduino microcontroller board contain?

104 / 171

What does strong authentication methods in APIs prevent?

105 / 171

What is one of the primary risks associated with Multimedia Messaging Service (MMS) as stated in the text?

106 / 171

What is meant by ’High availability and high availability across zones’ in terms of cloud security controls?

107 / 171

Which communication method is typically used when transferring data over a cable rather than over the air?

108 / 171

What are some methods to protect the confidentiality of data within a database?

109 / 171

What is the risk associated with the use of third-party app stores?

110 / 171

What can MDM tools do to control applications on mobile devices?

111 / 171

Which of the following describes the limitations of 5G communication method for embedded systems and IoT devices?

112 / 171

What are Subscriber identity module (SIM) cards typically used for in the context of embedded systems and IoT devices?

113 / 171

What is the primary function of permissions in a cloud service provider’s system?

114 / 171

What is the main purpose of a hypervisor in a virtualized system?

115 / 171

What does ’Host elasticity’ in terms of virtual machines (VM) mean?

116 / 171

What are the primary goals of configuration management practices in an organization?

117 / 171

What does ’Host Scalability’ refer to in the context of virtual machines?

118 / 171

In the context of cloud security controls, what does segmentation refer to?

119 / 171

What is a VM escape attack?

120 / 171

What does ’Instance awareness’ refer to in the context of cloud-based resources?

121 / 171

What is the purpose of using secure baselines as a part of an organization’s security strategy?

122 / 171

What does ’secrets management’ refers to in the context of cloud security controls?

123 / 171

Why is using a master image beneficial for system deployments?

124 / 171

Which of the following best describes the risks associated with using Short Message Service (SMS) and Multimedia Messag Service (MMS)?

125 / 171

What is a point-to-point connection in mobile devices?

126 / 171

What is the primary use of NFC (near field communication) in mobile devices?

127 / 171

What potential risk does Universal Serial Bus On-The-Go (USB OTG) cables pose to an organization’s information security?

128 / 171

Which type of network depends on the cellular provider and the device in use?

129 / 171

What is the role of a hypervisor in a virtualization setup?

130 / 171

What is the benefit of adding Software-defined visibility (SDV) to an organization’s network?

131 / 171

What is a community cloud in terms of cloud deployment models?

132 / 171

Why is encrypting data considered a primary way to prevent the loss of confidentiality?

133 / 171

What type of wireless protocol do most mobile devices use to support the use of a Bluetooth headset for hands-free use?

134 / 171

What is the function of containerization in mobile device management?

135 / 171

What is the purpose of the screen-locking feature supported by most mobile devices?

136 / 171

What are the limitations of mobile devices when it comes to the use of passwords or personal identification numbers (PINs) in the context of Mobile Device Management (MDM) systems?

137 / 171

What is the function of RFID systems in mobile devices?

138 / 171

What is the role of authorization in the context of APIs?

139 / 171

What is the main difference between Corporate-owned, personally enabled (COPE) model and the traditional corporate-owned model?

140 / 171

What is the main challenge that organizations face when implementing a BYOD (bring your own device) policy?

141 / 171

What is an example of the harm that can be caused by faults in the Industrial Control Systems (ICS)?

142 / 171

What does the term ’Narrow-band’ generally refer to in the context of communication methods for embedded systems and IoT devices?

143 / 171

What is a constraint of power in embedded systems?

144 / 171

Why might an organization want to limit a mobile device’s ability to tether or use Wi-Fi Direct?

145 / 171

What does full device encryption provide in terms of mobile device security?

146 / 171

What is a key difference between a hardware security module (HSM) and a TPM?

147 / 171

What does the term ’On-premises’ refer to in relation to organization’s resources?

148 / 171

What is the role of transport level security in an API?

149 / 171

Which of the following practices increases the security risk to a mobile device?

150 / 171

What is the major advantage of UEFI over BIOS?

151 / 171

In the context of mobile device management, what does ’context-aware authentication’ entail?

152 / 171

What does patch management mainly include?

153 / 171

What distinguishes Raspberry Pi from Arduino in terms of its functionality?

154 / 171

What is one key difference between a Managed Security Service Provider (MSSP) and a Managed Service Provider (MSP)?

155 / 171

What is the role of a host in the context of virtualization?

156 / 171

According to the section ’Firewall Considerations’, which one is NOT a characteristic of cloud-based firewalls?

157 / 171

What actions does a data loss prevention (DLP) system perform in an organization?

158 / 171

What is the function of a real-time operating system (RTOS) in the context of embedded systems?

159 / 171

What differentiates an application approved list from an application block list?

160 / 171

Which of the following describes a technique used by organizations to create a virtual geographic boundary using mobile device’s GPS capabilities?

161 / 171

What is the purpose of data replication in cloud data security as mentioned in the CompTIA Security+ SY0-701 syllabus?

162 / 171

What is a common use of an Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) in the manufacturing and industrial sector?

163 / 171

What is a potential benefit of hardening a system?

164 / 171

What does the term ’Anything as a Service’ (XaaS) refer to?

165 / 171

Which of the following explains a key security challenge specific to embedded systems?

166 / 171

Which of the following defines the ’Enforcing mode’ in the context of Security-Enhanced Linux (SELinux) used by the security-enhanced Android (SEAndroid) security model?

167 / 171

What does encryption aid in when referring to Cloud Service Providers (CSPs)?

168 / 171

What is a field programmable gate array (FPGA) in the context of an embedded system?

169 / 171

What is the purpose of using push notifications in Mobile Device Management (MDM)?

170 / 171

What is a point-to-multipoint connection?

171 / 171

What is the primary purpose of boot integrity processes implemented by many organizations?

Your score is

Boost Your Skills with Free Anki Flashcards

Click the download button to get the CompTIA Security+ Anki deck.

Anki deck of CompTIA A+ Practice Questions images
Boost your IT skills with our free CompTIA Security+ practice test focusing on Chapter 05: Securing Hosts and Data. Whether you’re entering the IT industry or advancing in cyber security, our resources are here to help you succeed in the CompTIA Exam.

Why Choose Our CompTIA Security+ Practice Test?

  • Skill Enhancement: Covers essential techniques for securing hosts and data crucial for the CompTIA Exam.
  • Career Advancement: Passing the CompTIA Security+ exam can open doors to new job opportunities and significant career changes in the IT industry.
  • Vulnerability Management: Master the art of securing hosts and data, a key skill in cyber security.

Free Anki Deck Download

Download our free Anki Deck, reviewed by industry expert Josh Madakor, who has extensive experience in IT and cyber security, including work with Microsoft and government sectors. Learn more about Anki on the official site.

Get Started with Your IT Career Change Today!

Visit the CompTIA Security+ official site and the CompTIA Network+ official site for more information.

Explore our other free practice tests:
Share the Post:

Related Posts

RSS  
  • Discover How to Work Remotely and Travel!
    Have you ever dreamed about working from beautiful places like Thailand or Japan, but weren’t sure if it’s possible? I’m here to share my adventures and some tips on how to make working remotely while exploring the world a reality.  Who Am I? My name is Josh, and I’m all about creating helpful content on […]
  • Why Contract Work in IT Can Be a Good Start for Your Career
    Hey buddies! Are you curious about what it’s like to work in IT and cyber security? Well, you’re in luck because today we’re diving into the world of contract work and how it might just be the jumpstart your career needed! Getting Into the World of Contract Work in IT Josh, an expert in IT […]
  • Is Cyber Security a Career That Will Last Forever?
    Hey everyone! Have you ever wondered if choosing a career in cyber security is a good idea for the long haul? Well, let’s dive into this topic with the help of Josh Maor’s insights, and find out why cyber security might just be one of the smartest career choices out there. What Is Cyber Security? […]
IT Course

The Affordable, Hands-On Josh Madakor IT Course that gets Results!

Ready to get started your journey?
Cyber Course

The Affordable, Hands-On Cyber Security that gets Results!

Ready to get started your journey?

JOIN OUR

NEWSLETTER

Sign up for our free newsletters.

by joining 8000+ others in my weekly newsletter 

where you’ll get a dose of my thoughts on self-improvement, career,

and life!