100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CERTMASTER CE SECURITY+ DOMAIN 3.0 SECURITY ARCHITECTURE ASSESSMENT QUESTION WITH 100% CORRECT ANSWERS

Rating
1.0
(1)
Sold
2
Pages
5
Grade
A+
Uploaded on
15-11-2024
Written in
2024/2025

CERTMASTER CE SECURITY+ DOMAIN 3.0 SECURITY ARCHITECTURE ASSESSMENT QUESTION WITH 100% CORRECT ANSWERS

Institution
CompTIA
Course
CompTIA









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CompTIA
Course
CompTIA

Document information

Uploaded on
November 15, 2024
Number of pages
5
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CERTMASTER CE SECURITY+ DOMAIN 3.0
SECURITY ARCHITECTURE ASSESSMENT
QUESTION WITH 100% CORRECT ANSWERS
A network security administrator's responsibilities include enhancing the enterprise's network
infrastructure security posture. They deploy a Next Generation Firewall (NGFW) as part of their
defense strategy. The enterprise mixes internal and external services, including a web
application and a virtual private network (VPN) for remote access. Which of the following
should the administrator primarily consider when implementing the NGFW to ensure effective
security without disrupting normal operations?
Set the NGFW to operate in a fail-open mode, ensuring continuous network service even if the
firewall fails.
Position the NGFW as a jump server to manage secure access for all network services.
Deploy the NGFW in inline mode, ensuring it analyzes all traffic while maintaining connectivity.
Use the NGFW as a load balancer, distributing network traffic across multiple servers. -
✔️✔️Deploy the NGFW in inline mode, ensuring it analyzes all traffic while maintaining
connectivity.


A company is developing a system that requires instantaneous response to certain inputs. The
system will incorporate into a larger device and will not have many resources. What type of
system is likely to be MOST suitable for this scenario?
Real-time operating system
Windows operating system
Linux operating system

Embedded systems - ✔️✔️Real-time operating system


A network engineer is segmenting a company's network to improve security. In terms of routing
infrastructure, which of the following strategies would the engineer employ to segment
different types of hosts attached to the same switch?
Assign a different internet protocol (IP) address to each host on the switch.
Group hosts into VLANs based on department, function, or security requirements.

, Use the Address Resolution Protocol to map each host's IP interface to a different media access
control address.

Use the same VLAN IDs and subnets for all hosts. - ✔️✔️Group hosts into VLANs based on
department, function, or security requirements.


A company transmits source code from its headquarters to a partnered third-party contract
group via the internet. The network administrator wants to enhance the security of this code
while it is in transit. The selected method converts data into a coded format that can only be
accessed with a key and password. Which technique is being used in this scenario?
Hashing
Obfuscation
Tokenization

Encryption - ✔️✔️Encryption


An organization plans to implement a load balancer as part of its network infrastructure to
manage the increased web traffic to its services. The organization tasks a network administrator
with ensuring that the load balancer is configured in line with best security practices to reduce
the attack surface and secure the enterprise infrastructure. The network administrator's
responsibilities include evaluating the network appliances, securing connectivity, and
considering device placement. What is the MOST effective security measure in this scenario?
Implement a Web Application Firewall alongside the load balancer.
Configure the load balancer to operate in a fail-open mode.
Use a proxy server in combination with the load balancer.

Place the load balancer in the screened subnet. - ✔️✔️Implement a Web Application Firewall
alongside the load balancer.


A large organization is planning to restructure its network infrastructure to create better
security boundaries and enhance control over network traffic as it undergoes expansion with an
increasing number of remote employees. What should the company implement to meet these
requirements?
Scalability
Logical segmentation

Reviews from verified buyers

Showing all reviews
5 months ago

1.0

1 reviews

5
0
4
0
3
0
2
0
1
1
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
AceYourCourse West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
13
Member since
1 year
Number of followers
8
Documents
271
Last sold
1 week ago

Get Yourself Well-Researched Study Materials to Ace Your Online& Actual Exam Tests with Confidence.

1.0

2 reviews

5
0
4
0
3
0
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions