CompTIA Security+ 4.5 Security Operations – Network Security Solutions

Posted by:

|

On:

|

0%

Network Security Solutions

1 / 25

Which of the following is a secure protocol used for remote administration of network devices?

2 / 25

A company wants to implement a solution that can prevent data exfiltration through email attachments. Which of the following is the BEST choice?

3 / 25

Which of the following is the MOST effective method to prevent unauthorized access to a corporate Wi-Fi network?

4 / 25

Which of the following protocols is used to securely transfer files between a client and a server, replacing the less secure FTP?

5 / 25

A company wants to implement a solution that can protect against man-in-the-middle attacks on its network. Which of the following is the MOST effective approach?

6 / 25

A security administrator wants to implement a solution that can detect and prevent network attacks in real-time without impacting legitimate traffic. Which of the following is the MOST appropriate choice?

7 / 25

Which of the following is the MOST effective method to protect against password cracking attempts on a corporate network?

8 / 25

Which of the following is the MOST effective method to protect against DNS cache poisoning attacks?

9 / 25

A company wants to implement a solution that can prevent data exfiltration through email attachments. Which of the following is the BEST choice?

10 / 25

A company wants to implement a solution that can prevent unauthorized access to its network resources based on the security posture of connecting devices. Which of the following is the MOST appropriate choice?

11 / 25

Which of the following is the MOST effective method to protect against password cracking attempts on a corporate network?

12 / 25

A security administrator wants to implement a solution that can detect and prevent network attacks in real-time without impacting legitimate traffic. Which of the following is the MOST appropriate choice?

13 / 25

Which of the following technologies is BEST suited for protecting against email spoofing and phishing attacks?

14 / 25

A company wants to implement a solution that can protect its web applications from common attacks such as SQL injection and cross-site scripting. Which of the following is the MOST appropriate choice?

15 / 25

A company wants to implement a solution that can prevent unauthorized access to its network resources based on the security posture of connecting devices. Which of the following is the MOST appropriate choice?

16 / 25

Which of the following is a secure protocol used for remote administration of network devices?

17 / 25

Which of the following is a secure alternative to HTTP that provides encryption for data in transit?

18 / 25

Which of the following is the MOST effective method to prevent unauthorized access to a corporate Wi-Fi network?

19 / 25

Which of the following is a secure protocol used for directory services that encrypts all traffic between the client and server?

20 / 25

A company wants to implement a solution that can provide secure remote desktop access for its employees. Which of the following protocols is the MOST secure choice for this purpose?

21 / 25

Which of the following is the MOST effective method to protect against DNS cache poisoning attacks?

22 / 25

Which of the following is a secure protocol used for directory services that encrypts all traffic between the client and server?

23 / 25

A company wants to implement a solution that can protect against man-in-the-middle attacks on its network. Which of the following is the MOST effective approach?

24 / 25

An organization wants to implement a solution that can provide secure, authenticated email communication between its employees. Which of the following is the MOST appropriate choice?

25 / 25

Which of the following technologies is BEST suited for protecting against email spoofing and phishing attacks?

Your score is

Exit