CompTIA Security+ 3.2 Security Architecture – Network Security

Posted by:

|

On:

|

Network Security

1 / 25

A company is implementing a Zero Trust architecture. Which of the following network security components is MOST essential for enforcing policy-based access control in this model?

2 / 25

A security administrator is implementing port security on a network switch. Which of the following methods would be MOST effective in preventing MAC address spoofing attacks?

3 / 25

A security administrator needs to implement a solution to protect against cross-site scripting (XSS) attacks on the organization’s web applications. Which of the following would be the MOST comprehensive approach?

4 / 25

A security analyst is investigating a potential insider threat within the organization. Which of the following network security technologies would be MOST effective in detecting and preventing unauthorized data transfers by privileged users?

5 / 25

A security administrator needs to implement a solution to protect against SQL injection attacks on the organization’s web applications. Which of the following would be the MOST effective approach?

6 / 25

An organization is implementing a secure remote access solution for their employees. Which of the following VPN protocols would provide the HIGHEST level of security?

7 / 25

An organization is implementing a secure remote access solution for their employees. Which of the following technologies would provide the MOST comprehensive security while allowing access to both on-premises and cloud-based resources?

8 / 25

A security administrator is configuring a Web Application Firewall (WAF) to protect against SQL injection attacks. Which of the following WAF deployment modes would provide the MOST comprehensive protection while minimizing the risk of false positives?

9 / 25

An organization wants to implement a network security solution that can provide visibility into encrypted traffic without decrypting it. Which of the following technologies would be MOST suitable for this purpose?

10 / 25

A security administrator needs to implement a solution to protect against man-in-the-middle attacks on the organization’s wireless network. Which of the following would be the MOST effective approach?

11 / 25

A security administrator needs to implement a solution to protect against session hijacking attacks on the organization’s web applications. Which of the following would be the MOST effective approach?

12 / 25

A security administrator needs to implement a solution to protect against DDoS attacks on the organization’s web servers. Which of the following would be the MOST effective approach?

13 / 25

A security analyst is investigating a potential Advanced Persistent Threat (APT) in the organization’s network. Which of the following network security tools would be MOST effective in detecting the lateral movement typically associated with APTs?

14 / 25

An organization wants to implement a network security solution that can provide centralized policy management and enforcement across their multi-cloud environment. Which of the following technologies would be MOST suitable for this purpose?

15 / 25

An organization is concerned about the security of their DNS infrastructure. Which of the following technologies would be MOST effective in preventing cache poisoning attacks?

16 / 25

A security analyst is investigating a potential data exfiltration attempt. Which of the following network security appliances would be MOST effective in detecting and preventing the unauthorized transfer of sensitive data?

17 / 25

An organization wants to implement a network security solution that can adapt to emerging threats in real-time. Which of the following technologies would be MOST suitable for this purpose?

18 / 25

A security administrator needs to implement a solution to protect against ARP spoofing attacks on the organization’s local network. Which of the following would be the MOST effective approach?

19 / 25

An organization is implementing a secure communication channel between two geographically separated data centers. Which of the following technologies would provide the MOST secure and efficient solution for this purpose?

20 / 25

An organization is implementing network segmentation to improve security. Which of the following technologies would be MOST effective for creating logical network segments while maintaining the ability to route between them?

21 / 25

An organization is implementing microsegmentation in their data center. Which of the following technologies would be MOST effective in achieving granular security controls at the workload level?

22 / 25

A security administrator needs to implement a solution to protect against DNS cache poisoning attacks. Which of the following technologies would be MOST effective for this purpose?

23 / 25

An organization is implementing a network security solution to protect against zero-day attacks. Which of the following technologies would be MOST effective in detecting and preventing previously unknown threats?

24 / 25

An organization is implementing a network security solution to protect their IoT devices. Which of the following technologies would be MOST effective in securing a large number of diverse IoT devices with limited computational resources?

25 / 25

An organization wants to implement a solution that can detect and block advanced persistent threats (APTs) by correlating data from multiple sources across the network. Which of the following technologies would be MOST suitable for this purpose?

Your score is

Exit