CompTIA Security+ 3.1 Security Architecture – Infrastructure

Posted by:

|

On:

|

Infrastructure

1 / 25

A company is adopting a serverless computing model for some of its applications. Which of the following is the MOST significant security benefit of this approach?

2 / 25

An organization is implementing a hybrid cloud environment using both public and private cloud resources. Which of the following is the MOST critical security challenge in this type of infrastructure?

3 / 25

An organization is implementing a software-defined networking (SDN) solution in their data center. Which of the following represents the MOST significant security advantage of this approach?

4 / 25

A company is implementing a cloud infrastructure entitlement management (CIEM) solution. Which of the following is the MOST significant benefit of CIEM in managing cloud security risks?

5 / 25

A company is implementing a bring your own device (BYOD) policy. Which of the following technologies is BEST suited to manage the security risks associated with this policy?

6 / 25

A company is implementing a secure access service edge (SASE) architecture. Which of the following is the MOST significant advantage of SASE over traditional network security approaches?

7 / 25

An organization is implementing a security information and event management (SIEM) system in their hybrid cloud environment. Which of the following is the MOST important consideration to ensure effective threat detection across both on-premises and cloud infrastructures?

8 / 25

A company is implementing a microservices architecture for its applications. Which of the following is the MOST critical security consideration specific to this architecture?

9 / 25

A company is implementing a software-defined perimeter (SDP) solution for their remote workforce. Which of the following is the MOST significant security advantage of SDP over traditional VPN solutions?

10 / 25

An organization is implementing a multi-factor authentication (MFA) solution for its cloud services. Which of the following factors would provide the HIGHEST level of security when combined with a password?

11 / 25

A company is implementing a virtual desktop infrastructure (VDI) solution. Which of the following represents the MOST significant security advantage of this approach?

12 / 25

A company is implementing a cloud access security broker (CASB) solution. Which of the following deployment modes provides the MOST comprehensive visibility and control over cloud service usage?

13 / 25

A company is implementing a data loss prevention (DLP) solution in their cloud environment. Which of the following is the MOST critical capability for this DLP solution to effectively protect sensitive data?

14 / 25

An organization is implementing a containerization strategy for its applications. Which of the following represents the MOST significant security challenge specific to container environments?

15 / 25

A company is implementing a cloud workload protection platform (CWPP) for their multi-cloud environment. Which of the following capabilities is MOST critical for effectively securing cloud workloads across different cloud service providers?

16 / 25

An organization is implementing a cloud access security broker (CASB) solution. Which of the following is the PRIMARY function of a CASB in securing cloud services?

17 / 25

An organization is implementing a cloud security posture management (CSPM) solution. Which of the following is the MOST important capability for maintaining a strong security posture across cloud environments?

18 / 25

An organization is implementing a zero trust architecture. Which of the following principles is MOST fundamental to this approach?

19 / 25

An organization is implementing a privileged access management (PAM) solution. Which of the following capabilities is MOST critical for effectively securing and monitoring privileged accounts?

20 / 25

An organization is implementing a network segmentation strategy. Which of the following approaches provides the MOST granular level of network isolation?

21 / 25

A company is implementing a service mesh architecture for their microservices-based applications. Which of the following is the MOST significant security benefit of using a service mesh?

22 / 25

A company is implementing a software-defined wide area network (SD-WAN) solution. Which of the following is the MOST significant security benefit of SD-WAN compared to traditional WAN architectures?

23 / 25

An organization is implementing a cloud-native application protection platform (CNAPP) for their containerized applications. Which of the following capabilities is MOST crucial for ensuring comprehensive security throughout the application lifecycle?

24 / 25

A company is implementing a DevSecOps approach in their software development lifecycle. Which of the following practices is MOST crucial for integrating security into the continuous integration/continuous deployment (CI/CD) pipeline?

25 / 25

An organization is implementing a cloud-based identity and access management (IAM) solution. Which of the following features is MOST critical for ensuring secure access across multiple cloud platforms and on-premises systems?

Your score is

Exit