Security+ SY0-701 Domain 3 ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Security Architecture (Part 1 of ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
3) exam with correct answers ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Which of the following descriptions is true about fail-open ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
and fail-closed configurations for security devices in the
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
event of a failure? ||\\||\\ ||\\||\\ ||\\||\\
- Both fail-open and fail-closed prioritize confidentiality
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
and integrity over availability. ||\\||\\ ||\\||\\ ||\\||\\
- Fail-open means that access is blocked or that the
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
system enters the most secure state available, while fail- ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
closed means that network or host access is preserved, if ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
possible.
- Fail-open means that network or host access is
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
preserved, if possible, while fail-closed means that access ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
is blocked or that the system enters the most secure state
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
available.
- Fail-open prioritizes confidentiality and integrity over
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
availability, while fail-closed prioritizes availability over ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
,confidentiality and integrity. - correct answers ✔✔Fail- ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
open means that network or host access is preserved, if
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
possible, while fail-closed means that access is blocked or ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
that the system enters the most secure state available
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Which of the following are advantages of virtualization? ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
(Select two.) ||\\||\\
- Easy migration of systems to different hardware
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Improved host-based attack detection
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Reduced utilization of hardware resources
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Centralized administration
||\\||\\ ||\\||\\
- Redundancy of hardware components for fault tolerance
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- correct answers ✔✔- Easy migration of systems to
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
different hardware ||\\||\\
- Centralized administration
||\\||\\ ||\\||\\
A large multinational corporation is implementing a data
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
protection strategy. The company has a complex IT ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
,environment with a mix of physical servers, virtual ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
machines, and cloud-based services. ||\\||\\ ||\\||\\ ||\\||\\
The primary concern is the ability to rapidly recover large
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
datasets and applications in the event of a major system
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
failure or data corruption. ||\\||\\ ||\\||\\ ||\\||\\
Which type of snapshot would be MOST suitable for this
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
organization?
- Filesystem snapshots
||\\||\\ ||\\||\\
- Virtual Machine (VM) snapshots
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Storage Area Network (SAN) snapshots
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Cloud-based snapshots - correct answers ✔✔Storage
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Area Network (SAN) snapshots
||\\||\\ ||\\||\\ ||\\||\\
Which of the following ports are used with TACACS?
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- 22
||\\||\\
, - 49
||\\||\\
- 50 and 51
||\\||\\ ||\\||\\ ||\\||\\
- 1812 and 1813
||\\||\\ ||\\||\\ ||\\||\\
- 3389 - correct answers ✔✔49
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
A system administrator implemented encryption across
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
the organization's IT infrastructure. The infrastructure
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
includes various types of data storage methods. ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Which of the following data storage methods can the ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
system administrator encrypt to increase the security of ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
data at rest? (Select three.) ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Remote access
||\\||\\ ||\\||\\
- Volume
||\\||\\
- Partition
||\\||\\
- User interface
||\\||\\ ||\\||\\
- File
||\\||\\
- Cloud repository synchronization
||\\||\\ ||\\||\\ ||\\||\\
Security Architecture (Part 1 of ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
3) exam with correct answers ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Which of the following descriptions is true about fail-open ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
and fail-closed configurations for security devices in the
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
event of a failure? ||\\||\\ ||\\||\\ ||\\||\\
- Both fail-open and fail-closed prioritize confidentiality
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
and integrity over availability. ||\\||\\ ||\\||\\ ||\\||\\
- Fail-open means that access is blocked or that the
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
system enters the most secure state available, while fail- ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
closed means that network or host access is preserved, if ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
possible.
- Fail-open means that network or host access is
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
preserved, if possible, while fail-closed means that access ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
is blocked or that the system enters the most secure state
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
available.
- Fail-open prioritizes confidentiality and integrity over
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
availability, while fail-closed prioritizes availability over ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
,confidentiality and integrity. - correct answers ✔✔Fail- ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
open means that network or host access is preserved, if
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
possible, while fail-closed means that access is blocked or ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
that the system enters the most secure state available
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Which of the following are advantages of virtualization? ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
(Select two.) ||\\||\\
- Easy migration of systems to different hardware
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Improved host-based attack detection
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Reduced utilization of hardware resources
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Centralized administration
||\\||\\ ||\\||\\
- Redundancy of hardware components for fault tolerance
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- correct answers ✔✔- Easy migration of systems to
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
different hardware ||\\||\\
- Centralized administration
||\\||\\ ||\\||\\
A large multinational corporation is implementing a data
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
protection strategy. The company has a complex IT ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
,environment with a mix of physical servers, virtual ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
machines, and cloud-based services. ||\\||\\ ||\\||\\ ||\\||\\
The primary concern is the ability to rapidly recover large
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
datasets and applications in the event of a major system
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
failure or data corruption. ||\\||\\ ||\\||\\ ||\\||\\
Which type of snapshot would be MOST suitable for this
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
organization?
- Filesystem snapshots
||\\||\\ ||\\||\\
- Virtual Machine (VM) snapshots
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Storage Area Network (SAN) snapshots
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Cloud-based snapshots - correct answers ✔✔Storage
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Area Network (SAN) snapshots
||\\||\\ ||\\||\\ ||\\||\\
Which of the following ports are used with TACACS?
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- 22
||\\||\\
, - 49
||\\||\\
- 50 and 51
||\\||\\ ||\\||\\ ||\\||\\
- 1812 and 1813
||\\||\\ ||\\||\\ ||\\||\\
- 3389 - correct answers ✔✔49
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
A system administrator implemented encryption across
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
the organization's IT infrastructure. The infrastructure
||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
includes various types of data storage methods. ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
Which of the following data storage methods can the ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
system administrator encrypt to increase the security of ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
data at rest? (Select three.) ||\\||\\ ||\\||\\ ||\\||\\ ||\\||\\
- Remote access
||\\||\\ ||\\||\\
- Volume
||\\||\\
- Partition
||\\||\\
- User interface
||\\||\\ ||\\||\\
- File
||\\||\\
- Cloud repository synchronization
||\\||\\ ||\\||\\ ||\\||\\