Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CompTIA Security

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
15-08-2024
Written in
2024/2025

Exam of 9 pages for the course CompTIA Security at CompTIA Security (CompTIA Security)

Institution
Course

Content preview

CompTIA Security+ Certification Exam SY0-601
Version- 7.0 |301 actual exam Questions & Answers|


A file-based representation of the state of a virtual machine at a given point in time is
called: - ANSWER Snapshot

The term "VM sprawl" is used to describe a situation in which large number of
deployed virtual machines lack proper administrative controls. - ANSWER TRUE

The term "VM escape" refers to the process of breaking out of the boundaries of a
guest operating system installation to access the primary hypervisor controlling all
the virtual machines on the host machine. - ANSWER TRUE

Which of the following security measures can be used to prevent VM sprawl? (Select
2 answers) - ANSWER - Usage audit
- Asset documentation

What are the countermeasures against VM escape? (Select 2 answers) - ANSWER
- Sandboxing
- Patch management

Which of the following terms refers to the concept of virtualization on an application
level? - ANSWER Containerization

What type of backups are commonly used with virtual machines? - ANSWER
Snapshot backups

In cloud computing, users on an on-premises network take advantage of a transit
gateway to connect to: - ANSWER VPC

Which of the following statements can be used to describe the disadvantages of
virtualization? (Select 2 answers) - ANSWER - Multiple virtual machines that are run
on a single host share hardware resources which has a degrading effect on
performance
- Hardware used for hosting virtual machines becomes a single point of failure

Which of the following answers refers to a cloud computing service model in which
clients, instead of buying all the hardware and software, purchase computing
resources as an outsourced service from suppliers who own and maintain all the
necessary equipment and software? - ANSWER IaaS (Infrastructure as a Service)

Which cloud service model would provide the best solution for a web developer
intending to create a web app? - ANSWER PaaS (Platform as a Service)

A cloud computing service model offering remote access to applications based on
monthly or annual subscription fee is called: - ANSWER SaaS (Software as a
Service)

, What is the name of a cloud computing deployment model in which the cloud
infrastructure is provisioned for open use by the general public? - ANSWER Public
cloud

A cloud deployment model consisting of two or more interlinked cloud infrastructures
(private, community, or public) is referred to as a hybrid cloud. - ANSWER TRUE

The term "Fog computing" refers to a local network infrastructure between IoT
devices and the cloud designed to speed up data transmission and processing. -
ANSWER TRUE

Which of the following answers refers to a security policy enforcement software tool
or service placed between cloud service users and cloud applications? - ANSWER
CASB (Cloud access security broker)

Which of the following answers refers to a nonprofit organization promoting best
practices related to cloud computing environments? - ANSWER CSA (Cloud
Security Alliance)

Which of the following answers refers to a cybersecurity control framework for cloud
computing? - ANSWER CCM (Cloud Controls Matrix)

A social engineering technique whereby attackers under disguise of a legitimate
request attempt to gain access to confidential information is commonly referred to
as: - ANSWER Phishing

Which of the following answers refer to smishing? (Select 2 answers) - ANSWER -
Social engineering technique
- Text messaging

The practice of using a telephone system to manipulate user into disclosing
confidential information is known as: - ANSWER Vishing

Which of the following terms is commonly used to describe an unsolicited advertising
message? - ANSWER Spam

What type of spam relies on text-based communication? - ANSWER SPIM

Phishing scams targeting a specific group of people are referred to as: - ANSWER
Spear phishing

In computer security, the term "Dumpster diving" is used to describe a practice of
sifting through trash for discarded documents containing sensitive data. Found
documents containing names and surnames of the employees along with the
information about positions held in the company and other data can be used to
facilitate social engineering attacks. Having the documents shredded or incinerated
before disposal makes dumpster diving less effective and mitigates the risk of social
engineering attacks. - ANSWER TRUE

Written for

Course

Document information

Uploaded on
August 15, 2024
Number of pages
9
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
michealmuthii Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
13
Member since
1 year
Number of followers
2
Documents
615
Last sold
1 month ago
EXCELLENT HOMEWORK HELP AND TUTORING

EXCELLENT HOMEWORK HELP AND TUTORING ,ALL KIND OF QUIZ AND EXAMS WITH GUARANTEE OF A EXCELLENT HOMEWORK HELP AND TUTORING ,ALL KIND OF QUIZ AND EXAMS WITH GUARANTEE OF A Am an expert on major courses especially; psychology,Nursing, Human resource Management and Mathemtics Assisting students with quality work is my first priority. I ensure scholarly standards in my documents and that\'s why i\'m one of the BEST GOLD RATED TUTORS in STUVIA. I assure a GOOD GRADE if you will use my work.

Read more Read less
4.6

386 reviews

5
257
4
100
3
26
2
3
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions