CompTIA Certmaster CE Security+ Domain 1.0
General Security Concepts Assessment
Question with 100% Correct Answers
An organization frequently implements changes, reconfigurations, and patches to
enhance its IT infrastructure's security and efficiency. The cybersecurity analyst
must carefully analyze dependencies between services, applications, and
interfaces to avoid unintended outages and disruptions during service restarts or
downtime events. How does understanding dependencies impact the change
management process? (Select the three best options.) - ✔️✔️A. Knowing
dependencies helps avoid unintended outages and disruptions during service
restarts or downtime events.
B. Understanding dependencies guides the development of effective backout
plans and downtime contingencies.
C. Understanding dependencies supports the development of post-change
performance monitoring to validate system functionality and quickly detect
issues.
After encountering a cyber attack, an organization uses a monitoring solution that
automatically restarts services after it has detected the system has crashed. What
type of functional security control is the company implementing? - ✔️✔️(C.
Technical incorrect)
A cyber security analyst wants to reduce the attack surface for a computer that
contains top secret data. The analyst installs a cryptoprocessor as a module within
the central processing unit (CPU) on the designated computer to accomplish this.
What type of cryptoprocessor is the analyst installing? - ✔️✔️C. Trusted Platform
Module (TPM)
, Prior to implementing new software integrations on the organization's network, a
software specialist evaluates the selected modifications in an environment to
ensure the software works correctly and does not cause issues. What concept
does the specialist observe with a desire to ensure everything works before
implementation? - ✔️✔️(A. Impact analysis incorrect)
An organization has an established change management program that includes
standard operating procedures (SOPs). It wants to implement changes
consistently and effectively. What role do SOPs play in the change management
process? - ✔️✔️B. They define routine operations or changes, providing detailed
instructions to implement them.
After receiving the annual audit results from the Inspector General's office, a
cyber specialist begins identifying points of contact to implement change
management on numerous flagged processes. Understanding the various
positions tied to change management, which roles would have ownership in the
change management process? (Select the two best options.) - ✔️✔️A. Project
manager
C. Team leader
A systems owner reviews permissions granted to a targeted team of employees
and determines that some of the employees' accesses are outside their scope of
work. After revoking the certificates, what log does the owner use to record the
changes? - ✔️✔️B. Certificate Revocation Lists (CRL)
A company installed a new locking cabinet in the computer room to hold extra
flash drives and other supplies. Which type of security control did the company
configure? - ✔️✔️A. Preventive
General Security Concepts Assessment
Question with 100% Correct Answers
An organization frequently implements changes, reconfigurations, and patches to
enhance its IT infrastructure's security and efficiency. The cybersecurity analyst
must carefully analyze dependencies between services, applications, and
interfaces to avoid unintended outages and disruptions during service restarts or
downtime events. How does understanding dependencies impact the change
management process? (Select the three best options.) - ✔️✔️A. Knowing
dependencies helps avoid unintended outages and disruptions during service
restarts or downtime events.
B. Understanding dependencies guides the development of effective backout
plans and downtime contingencies.
C. Understanding dependencies supports the development of post-change
performance monitoring to validate system functionality and quickly detect
issues.
After encountering a cyber attack, an organization uses a monitoring solution that
automatically restarts services after it has detected the system has crashed. What
type of functional security control is the company implementing? - ✔️✔️(C.
Technical incorrect)
A cyber security analyst wants to reduce the attack surface for a computer that
contains top secret data. The analyst installs a cryptoprocessor as a module within
the central processing unit (CPU) on the designated computer to accomplish this.
What type of cryptoprocessor is the analyst installing? - ✔️✔️C. Trusted Platform
Module (TPM)
, Prior to implementing new software integrations on the organization's network, a
software specialist evaluates the selected modifications in an environment to
ensure the software works correctly and does not cause issues. What concept
does the specialist observe with a desire to ensure everything works before
implementation? - ✔️✔️(A. Impact analysis incorrect)
An organization has an established change management program that includes
standard operating procedures (SOPs). It wants to implement changes
consistently and effectively. What role do SOPs play in the change management
process? - ✔️✔️B. They define routine operations or changes, providing detailed
instructions to implement them.
After receiving the annual audit results from the Inspector General's office, a
cyber specialist begins identifying points of contact to implement change
management on numerous flagged processes. Understanding the various
positions tied to change management, which roles would have ownership in the
change management process? (Select the two best options.) - ✔️✔️A. Project
manager
C. Team leader
A systems owner reviews permissions granted to a targeted team of employees
and determines that some of the employees' accesses are outside their scope of
work. After revoking the certificates, what log does the owner use to record the
changes? - ✔️✔️B. Certificate Revocation Lists (CRL)
A company installed a new locking cabinet in the computer room to hold extra
flash drives and other supplies. Which type of security control did the company
configure? - ✔️✔️A. Preventive